Show simple item record

dc.contributor.editorAvoine, Gildas
dc.contributor.editorHernandez-Castro, Julio
dc.date.accessioned2021-02-15T10:19:55Z
dc.date.available2021-02-15T10:19:55Z
dc.date.issued2021
dc.identifierONIX_20210215_9783030105914_6
dc.identifier.urihttps://library.oapen.org/handle/20.500.12657/46790
dc.description.abstractThe chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.
dc.languageEnglish
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UR Computer securityen_US
dc.subject.classificationthema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TH Energy technology and engineering::THR Electrical engineeringen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technologyen_US
dc.subject.classificationthema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TN Civil engineering, surveying and building::TNK Building construction and materials::TNKS Security and fire alarm systemsen_US
dc.subject.otherSystems and Data Security
dc.subject.otherCyber-physical systems, IoT
dc.subject.otherProfessional Computing
dc.subject.otherSecurity Science and Technology
dc.subject.otherData and Information Security
dc.subject.otherInternet of Things
dc.subject.otherCryptology
dc.subject.otherCryptacus
dc.subject.otherSecurity
dc.subject.otherUbiquitous Devices
dc.subject.otherLightweight Cryptography
dc.subject.otherSymmetric Cryptography
dc.subject.otherSide-Channel Analysis
dc.subject.otherIoT Security
dc.subject.otherUbiquitous Computing Systems
dc.subject.otherOpen Access
dc.subject.otherComputer security
dc.subject.otherNetwork security
dc.subject.otherElectrical engineering
dc.subject.otherCybernetics & systems theory
dc.subject.otherApplied computing
dc.subject.otherSecurity & fire alarm systems
dc.titleSecurity of Ubiquitous Computing Systems
dc.title.alternativeSelected Topics
dc.typebook
oapen.identifier.doi10.1007/978-3-030-10591-4
oapen.relation.isPublishedBy6c6992af-b843-4f46-859c-f6e9998e40d5
oapen.relation.isFundedBy2de1b435-7c46-4935-ad59-3c63b75a8a71
oapen.imprintSpringer
oapen.pages265
oapen.grant.number[grantnumber unknown]


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record