• Complain

Gildas Avoine - Security of Ubiquitous Computing Systems Selected Topics

Here you can read online Gildas Avoine - Security of Ubiquitous Computing Systems Selected Topics full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Springer International Publishing, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Gildas Avoine Security of Ubiquitous Computing Systems Selected Topics

Security of Ubiquitous Computing Systems Selected Topics: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Security of Ubiquitous Computing Systems Selected Topics" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Gildas Avoine: author's other books


Who wrote Security of Ubiquitous Computing Systems Selected Topics? Find out the surname, the name of the author of the book and a list of all author's works by series.

Security of Ubiquitous Computing Systems Selected Topics — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Security of Ubiquitous Computing Systems Selected Topics" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Security of Ubiquitous Computing Systems Editors Gildas - photo 1
Book cover of Security of Ubiquitous Computing Systems
Editors
Gildas Avoine and Julio Hernandez-Castro
Security of Ubiquitous Computing Systems
Selected Topics
1st ed. 2021
Logo of the publisher Editors Gildas Avoine Institut National des - photo 2
Logo of the publisher
Editors
Gildas Avoine
Institut National des Sciences Appliques, Rennes, France
Julio Hernandez-Castro
University of Kent, Canterbury, UK
ISBN 978-3-030-10590-7 e-ISBN 978-3-030-10591-4
https://doi.org/10.1007/978-3-030-10591-4
This book is an open access publication.
The Editor(s) (if applicable) and The Author(s) 2021
Open Access This book is licensed under the terms of the Creative Commons - photo 3

Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License ( http://creativecommons.org/licenses/by/4.0/ ), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

The images or other third party material in this book are included in the book's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the book's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG.

The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Preface
From the Cryptacus Project to the Cryptacus Book

Dear reader, we thank you for your interest in this book, which we expect will help you gain an understanding of the state of the art in 2020 regarding the challenges and solutions in the security of ubiquitous computing systems.

The definition of the field itself is not without controversy, but in this book we will use the term ubiquitous computing or IoT to refer to generally small, embedded devices with serious constraints in terms of memory and processing power, typically with no batteries but with good connection capabilities and, frequently, a number of sensors. This definition is, of course, flexible. Electronic passports, contactless transportation cards, personal assistants such as Amazon Echo but also new connected cars and fridges can fall within this definition.

This book is targeted to advanced undergraduate students and masters and early Ph.D. students who want quick, direct, authoritative, insightful exposure to the topics covered, all generally falling under the umbrella of IoT security. Engineers and other practitioners can also benefit from the book by getting a quick introduction to a variety of practical security topics, their past and present solutions, and some new and promising ideas that may play important roles in its future.

This book would not have been possible without the support of the CRYPTACUS (Cryptanalysis in Ubiquitous Computing Systems) COST Action IC 1403, which started in 2014 and ended in December 2018. We are particularly thankful to the EU COST association, which was extremely positive for the community in Europe and associated countries such as Switzerland, Turkey, and Israel, and we are particularly grateful to the colleagues who were interested in our action.

As Chair (GA) and Vice-Chair (JH-C) we worked hard on the project, but we enjoyed the possibilities offered for collaboration and furthering exchanges between researchers in IoT security and cryptography in Europe. In particular, we are proud that the CRYPTACUS Action achieved a number of successes that can be reflected in the following figures:
  • 32 short-term scientific missions

  • 5 scientific meetings

  • 2 training schools

  • 3 workshops and 1 conference

In total, more than 120 researchers took part in related events or activities. We want to thank the Work Package Leaders and Vice-Leaders Prof. Serge Vaudenay, Prof. Frederic Armknecht, Prof. Andrey Bogdanov, Prof. Mirosaw Kutyowski, Prof. Lejla Batina, Prof. Ricardo Chaves, Prof. Flavio Garcia, and Prof. Alex Biryukov. A special thanks as well to Prof. Bart Preneel.

Book Contents

The book is divided into 13 chapters. They can be read independently, but are organised into 5 parts covering topics with some commonalities.

In Part I, the reader can find a very interesting and general introduction by Mirosaw Kutyowski, Piotr Syga, and Moti Yung called Emerging Security Challenges for Ubiquitous Devices.

After that, there is a part on Lightweight Cryptographic Primitives where 3 chapters try to offer insightful views of the state of the art on symmetric lightweight cryptographic primitives. The chapter Catalog and Illustrative Examples of Lightweight Cryptographic Primitives by Aleksandra Mileva, Vesna Dimitrova, Orhun Kara, and Miodrag Mihaljevi nicely exposes the state of the art in the discipline, covering the most important proposals in detail. This is aptly complemented by the next chapter Selected Design and Analysis Techniques in Contemporary Symmetric Encryption, where Vasily Mikhalev, Miodrag Mihaljevi, Orhun Kara, and Frederik Armknecht offer a splendid review of the techniques and reasoning behind the most successful approaches to designing and attacking these systems. Last, but not least, we conclude this part with an exceptional first-person account of the many issues that surrounded the failed attempts to standardise a couple of NSAs proposed lightweight block ciphers in An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families by Atul Luyks and Tomer Ashur.

In the next part of the book, called Authentication Protocols, we focus on lightweight and ultra-lightweight authentication protocols. The section starts with a chapter by Lucjan Hanzlik and Mirosaw Kutyowski titled ePassport and eID Technologies, where the authors examine the existing ePassport literature and offer some new solutions and open problems. Xavier Carpent, Paolo DArco, and Roberto De Prisco contributed the chapter Ultra-lightweight Authentication

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Security of Ubiquitous Computing Systems Selected Topics»

Look at similar books to Security of Ubiquitous Computing Systems Selected Topics. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Security of Ubiquitous Computing Systems Selected Topics»

Discussion, reviews of the book Security of Ubiquitous Computing Systems Selected Topics and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.