LEADER 03931nam 2200697Ia 450 001 9910451053203321 005 20200520144314.0 010 $a6610505187 010 $a1-280-50518-4 010 $a9786610505180 010 $a1-4237-9732-9 010 $a1-60750-155-4 010 $a600-00-0549-0 010 $a1-60129-135-3 035 $a(CKB)1000000000340195 035 $a(EBL)265974 035 $a(OCoLC)437171014 035 $a(SSID)ssj0000243203 035 $a(PQKBManifestationID)11210995 035 $a(PQKBTitleCode)TC0000243203 035 $a(PQKBWorkID)10322526 035 $a(PQKB)11016545 035 $a(MiAaPQ)EBC265974 035 $a(Au-PeEL)EBL265974 035 $a(CaPaEBR)ebr10130650 035 $a(CaONFJC)MIL50518 035 $a(OCoLC)71202776 035 $a(EXLCZ)991000000000340195 100 $a20060407d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity and embedded systems$b[electronic resource] /$fedited by Dimitrios N. Serpanos and Ran Giladi 210 $aAmsterdam ;$aWashington, D.C. $cIOS Press$dc2006 215 $a1 online resource (216 p.) 225 1 $aNATO security through science series. D, Information and communication security ;$vvol. 2 300 $aProceedings from the NATO Advanced Research Workshop on "Security and Embedded Systems." 311 $a1-58603-580-0 320 $aIncludes bibliographical references and author index. 327 $aTitle page; Preface; Contents; Chaotic Routing as a Method of an Information Conversion; Combinatorial Game Models for Security Systems; Architectural Enhancements for Secure Embedded Processing; Computational Improvements to Differential Side Channel Analysis; A Process Algebra Approach to Authentication and Secrecy; Intellectual Property Protection Using Embedded Systems; Challenges in Deeply Networked System Survivability; Multimedia Watermarking; A Platform for Designing Secure Embedded Systems; Cryptographic Insecurity of the Test & Repeat Paradigm 327 $aA Privacy Classification Model Based on Linkability ValuationA Run-Time Reconfigurable Architecture for Embedded Program Flow Verification; Model-Based Validation of Enterprise Access Policies; Research Issues in Homeland Security; Assurance in Autonomous Decentralized Embedded System; Vulnerabilities and Countermeasures for Embedded Processors; Agent-Based Modeling and Simulation of Malefactors' Attacks Against Computer Networks; Current Problems in Security of Military Networks; Multi-Agent Framework for Intrusion Detection and Alert Correlation 327 $aSecuring Home and Building Automation Systems Using the zPnP ApproachREWARD: A Routing Method for Ad-Hoc Networks with Adjustable Security Capability; On the Security of the GSM Cellular Network; Telecommunications Fraud & Electronic Crime in Fix and Mobile Embedded Systems; Author Index 330 $aFocuses on the deployment and use of embedded systems in a range of applications. Considering the main directions of research in the field, three main areas are discussed: foundations of security and embedded systems; secure embedded computing systems; and telecommunications and network services. 410 0$aNATO security through science series.$nD,$pInformation and communication security ;$vv. 2. 606 $aEmbedded computer systems$xSecurity measures$vCongresses 606 $aComputer security$vCongresses 608 $aElectronic books. 615 0$aEmbedded computer systems$xSecurity measures 615 0$aComputer security 676 $a005.8 701 $aGiladi$b Ran$01057208 701 $aSerpanos$b Dimitrios Nikolaou$01057209 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910451053203321 996 $aSecurity and embedded systems$92492222 997 $aUNINA