Electronic Resource
Security of Ubiquitous Computing Systems
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems.
The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains.
Availability
#
My Library (oer.unej.ac.id)
Location name is not set
2003122025
Available - and the nature and attribution
Detail Information
- Series Title
-
-
- Call Number
-
-
- Publisher
-
:
Springer Cham.,
2021
- Collation
-
XVIII, 265 hlm,: ill, lamp;
- Language
-
- ISBN/ISSN
-
9783030105914
- Classification
-
-
- Content Type
-
text
- Media Type
-
computer
- Carrier Type
-
online resource
- Edition
-
1
- Subject(s)
-
- Specific Detail Info
-
Ubiquitous computing systems require new approaches to security
Result of the successful EU Horizon 2020 Cost Action project Cryptacus
Contributions from top-class researchers in security and cryptography
- Statement of Responsibility
-
Gildas Avoine, Julio Hernandez-Castro
Other Information
- Cataloger
-
-
- Source
-
https://link.springer.com/book/10.1007/978-3-030-10591-4
- Validator
-
ida
- Digital Object Identifier (DOI)
-
https://doi.org/10.1007/978-3-030-10591-4
- Journal Volume
-
-
- Journal Issue
-
-
- Subtitle
-
-
- Parallel Title
-
-
Other version/related
No other version available
File Attachment
No Data
You must be logged in to post a comment