LEADER 04412nam 22007575 450 001 9910473459903321 005 20250628110054.0 010 $a3-030-10591-1 024 7 $a10.1007/978-3-030-10591-4 035 $a(CKB)4100000011716979 035 $a(DE-He213)978-3-030-10591-4 035 $a(MiAaPQ)EBC6455781 035 $a(Au-PeEL)EBL6455781 035 $a(OCoLC)1232280332 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/63653 035 $a(PPN)253255147 035 $a(ODN)ODN0010073508 035 $a(oapen)doab63653 035 $a(EXLCZ)994100000011716979 100 $a20210114d2021 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity of Ubiquitous Computing Systems $eSelected Topics /$fedited by Gildas Avoine, Julio Hernandez-Castro 205 $a1st ed. 2021. 210 $cSpringer Nature$d2021 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (XVIII, 265 p. 25 illus., 8 illus. in color.) 311 08$a3-030-10590-3 327 $aPart I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics. 330 $aThe chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license. 606 $aComputer security 606 $aComputer engineering 606 $aInternet of things 606 $aEmbedded computer systems 606 $aComputer software 606 $aSystem safety 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCyber-physical systems, IoT$3https://scigraph.springernature.com/ontologies/product-market-codes/T24080 606 $aProfessional Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I29000 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 615 0$aComputer security. 615 0$aComputer engineering. 615 0$aInternet of things. 615 0$aEmbedded computer systems. 615 0$aComputer software. 615 0$aSystem safety. 615 14$aSystems and Data Security. 615 24$aCyber-physical systems, IoT. 615 24$aProfessional Computing. 615 24$aSecurity Science and Technology. 676 $a005.8 676 $a004 686 $aCOM000000$aCOM053000$aTEC007000$aTEC009000$2bisacsh 700 $aAvoine$b Gildas$4edt$01354923 702 $aAvoine$b Gildas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHernandez-Castro$b Julio$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910473459903321 996 $aSecurity of Ubiquitous Computing Systems$93358695 997 $aUNINA