Design Methodologies for Secure Embedded Systems

N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.

Cite

CITATION STYLE

APA

Biedermann, A., & Molter, H. G. (Eds.). (2010). Design Methodologies for Secure Embedded Systems (Lecture No, p. 206). Springer, Berlin, Germany. Retrieved from http://www.springer.com/engineering/circuits+%26+systems/book/978-3-642-16766-9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free