ShopSpell

Trusted Computing for Embedded Systems [Hardcover]

$87.99     $109.99    20% Off      (Free Shipping)
100 available
  • Category: Books (Technology & Engineering)
  • ISBN-10:  331909419X
  • ISBN-10:  331909419X
  • ISBN-13:  9783319094199
  • ISBN-13:  9783319094199
  • Publisher:  Springer
  • Publisher:  Springer
  • Binding:  Hardcover
  • Binding:  Hardcover
  • Pub Date:  01-Mar-2014
  • Pub Date:  01-Mar-2014
  • SKU:  331909419X-11-SPRI
  • SKU:  331909419X-11-SPRI
  • Item ID: 100302502
  • List Price: $109.99
  • Seller: ShopSpell
  • Ships in: 5 business days
  • Transit time: Up to 5 business days
  • Delivery by: Dec 28 to Dec 30
  • Notes: Brand New Book. Order Now.

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc.

????????? Enables readers to address a variety of security threats to embedded hardware and software;

????????? Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems;

????????? Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.

?

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applicationslÃ

Add Review