![buchspektrum Internet-Buchhandlung](../buchspektrumlogo.gif) Neuerscheinungen 2014Stand: 2020-02-01 |
Schnellsuche
ISBN/Stichwort/Autor
|
Herderstraße 10 10625 Berlin Tel.: 030 315 714 16 Fax 030 315 714 14 info@buchspektrum.de |
![](https://multimedia.knv.de/cover/51/22/75/5122757200001n.jpg)
Alexander Biedermann, Gregor H Molter
(Beteiligte)
Design Methodologies for Secure Embedded Systems
Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss
Herausgegeben von Biedermann, Alexander; Molter, Gregor H
2011. 2014. xiii, 207 S. 235 mm
Verlag/Jahr: SPRINGER, BERLIN; SPRINGER BERLIN HEIDELBERG 2014
ISBN: 3-642-42299-3 (3642422993)
Neue ISBN: 978-3-642-42299-7 (9783642422997)
Preis und Lieferzeit: Bitte klicken
Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.
Towards Co-Design of HW/SW/Analog Systems.- A Flexible Hierarchical Approach for Controlling the System-Level.- Side-Channel Analysis { Mathematics Has Met Engineering.- Survey of Methods to Improve Side-Channel Resistance on Partial Recongurable Platforms.- Multicast Rekeying: Performance Evaluation.- Robustness Analysis of Watermark Veri cation Techniques for FPGA Netlist Cores.- Efficient and Flexible Co-Processor for Server-based Public Key Cryptography Applications.- Cellular-Array Implementations of Bio-Inspired Self-Healing Systems.- State of the Art and Future Perspectives .- Combined Man-in-the-Loop and Software-in-the-Loop Simulation.- Secure Beamforming for Weather Hazard Warning Application in Car-to-X Communication.