Gildas Avoine - Security of Ubiquitous Computing Systems Selected Topics
Here you can read online Gildas Avoine - Security of Ubiquitous Computing Systems Selected Topics full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Springer International Publishing, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:
Romance novel
Science fiction
Adventure
Detective
Science
History
Home and family
Prose
Art
Politics
Computer
Non-fiction
Religion
Business
Children
Humor
Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.
- Book:Security of Ubiquitous Computing Systems Selected Topics
- Author:
- Publisher:Springer International Publishing
- Genre:
- Year:2021
- Rating:5 / 5
- Favourites:Add to favourites
- Your mark:
- 100
- 1
- 2
- 3
- 4
- 5
Security of Ubiquitous Computing Systems Selected Topics: summary, description and annotation
We offer to read an annotation, description, summary or preface (depends on what the author of the book "Security of Ubiquitous Computing Systems Selected Topics" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.
Security of Ubiquitous Computing Systems Selected Topics — read online for free the complete book (whole text) full work
Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Security of Ubiquitous Computing Systems Selected Topics" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.
Font size:
Interval:
Bookmark:
Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License ( http://creativecommons.org/licenses/by/4.0/ ), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this book are included in the book's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the book's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
This Springer imprint is published by the registered company Springer Nature Switzerland AG.
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Dear reader, we thank you for your interest in this book, which we expect will help you gain an understanding of the state of the art in 2020 regarding the challenges and solutions in the security of ubiquitous computing systems.
The definition of the field itself is not without controversy, but in this book we will use the term ubiquitous computing or IoT to refer to generally small, embedded devices with serious constraints in terms of memory and processing power, typically with no batteries but with good connection capabilities and, frequently, a number of sensors. This definition is, of course, flexible. Electronic passports, contactless transportation cards, personal assistants such as Amazon Echo but also new connected cars and fridges can fall within this definition.
This book is targeted to advanced undergraduate students and masters and early Ph.D. students who want quick, direct, authoritative, insightful exposure to the topics covered, all generally falling under the umbrella of IoT security. Engineers and other practitioners can also benefit from the book by getting a quick introduction to a variety of practical security topics, their past and present solutions, and some new and promising ideas that may play important roles in its future.
This book would not have been possible without the support of the CRYPTACUS (Cryptanalysis in Ubiquitous Computing Systems) COST Action IC 1403, which started in 2014 and ended in December 2018. We are particularly thankful to the EU COST association, which was extremely positive for the community in Europe and associated countries such as Switzerland, Turkey, and Israel, and we are particularly grateful to the colleagues who were interested in our action.
32 short-term scientific missions
5 scientific meetings
2 training schools
3 workshops and 1 conference
In total, more than 120 researchers took part in related events or activities. We want to thank the Work Package Leaders and Vice-Leaders Prof. Serge Vaudenay, Prof. Frederic Armknecht, Prof. Andrey Bogdanov, Prof. Mirosaw Kutyowski, Prof. Lejla Batina, Prof. Ricardo Chaves, Prof. Flavio Garcia, and Prof. Alex Biryukov. A special thanks as well to Prof. Bart Preneel.
The book is divided into 13 chapters. They can be read independently, but are organised into 5 parts covering topics with some commonalities.
In Part I, the reader can find a very interesting and general introduction by Mirosaw Kutyowski, Piotr Syga, and Moti Yung called Emerging Security Challenges for Ubiquitous Devices.
After that, there is a part on Lightweight Cryptographic Primitives where 3 chapters try to offer insightful views of the state of the art on symmetric lightweight cryptographic primitives. The chapter Catalog and Illustrative Examples of Lightweight Cryptographic Primitives by Aleksandra Mileva, Vesna Dimitrova, Orhun Kara, and Miodrag Mihaljevi nicely exposes the state of the art in the discipline, covering the most important proposals in detail. This is aptly complemented by the next chapter Selected Design and Analysis Techniques in Contemporary Symmetric Encryption, where Vasily Mikhalev, Miodrag Mihaljevi, Orhun Kara, and Frederik Armknecht offer a splendid review of the techniques and reasoning behind the most successful approaches to designing and attacking these systems. Last, but not least, we conclude this part with an exceptional first-person account of the many issues that surrounded the failed attempts to standardise a couple of NSAs proposed lightweight block ciphers in An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families by Atul Luyks and Tomer Ashur.
In the next part of the book, called Authentication Protocols, we focus on lightweight and ultra-lightweight authentication protocols. The section starts with a chapter by Lucjan Hanzlik and Mirosaw Kutyowski titled ePassport and eID Technologies, where the authors examine the existing ePassport literature and offer some new solutions and open problems. Xavier Carpent, Paolo DArco, and Roberto De Prisco contributed the chapter Ultra-lightweight Authentication
Font size:
Interval:
Bookmark:
Similar books «Security of Ubiquitous Computing Systems Selected Topics»
Look at similar books to Security of Ubiquitous Computing Systems Selected Topics. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.
Discussion, reviews of the book Security of Ubiquitous Computing Systems Selected Topics and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.