Trusted computing for embedded systems

2Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc.

Cite

CITATION STYLE

APA

Candaele, B., Soudris, D., & Anagnostopoulos, I. (2015). Trusted computing for embedded systems. Trusted Computing for Embedded Systems (pp. 1–299). Springer International Publishing. https://doi.org/10.1007/978-3-319-09420-5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free