LEADER 05099nam 22009735 450 001 996464447403316 005 20230125212555.0 010 $a3-030-10591-1 024 7 $a10.1007/978-3-030-10591-4 035 $a(CKB)4100000011716979 035 $a(DE-He213)978-3-030-10591-4 035 $a(MiAaPQ)EBC6455781 035 $a(Au-PeEL)EBL6455781 035 $a(OCoLC)1232280332 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/63653 035 $a(PPN)253255147 035 $a(EXLCZ)994100000011716979 100 $a20210114d2021 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity of Ubiquitous Computing Systems$b[electronic resource] $eSelected Topics /$fedited by Gildas Avoine, Julio Hernandez-Castro 205 $a1st ed. 2021. 210 $cSpringer Nature$d2021 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (XVIII, 265 p. 25 illus., 8 illus. in color.) 311 $a3-030-10590-3 327 $aPart I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics. 330 $aThe chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license. 606 $aComputer security 606 $aComputer engineering 606 $aInternet of things 606 $aEmbedded computer systems 606 $aComputer software 606 $aSystem safety 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCyber-physical systems, IoT$3https://scigraph.springernature.com/ontologies/product-market-codes/T24080 606 $aProfessional Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I29000 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 610 $aSystems and Data Security 610 $aCyber-physical systems, IoT 610 $aProfessional Computing 610 $aSecurity Science and Technology 610 $aData and Information Security 610 $aInternet of Things 610 $aCryptology 610 $aCryptacus 610 $aSecurity 610 $aUbiquitous Devices 610 $aLightweight Cryptography 610 $aSymmetric Cryptography 610 $aSide-Channel Analysis 610 $aIoT Security 610 $aUbiquitous Computing Systems 610 $aOpen Access 610 $aComputer security 610 $aNetwork security 610 $aElectrical engineering 610 $aCybernetics & systems theory 610 $aApplied computing 610 $aSecurity & fire alarm systems 615 0$aComputer security. 615 0$aComputer engineering. 615 0$aInternet of things. 615 0$aEmbedded computer systems. 615 0$aComputer software. 615 0$aSystem safety. 615 14$aSystems and Data Security. 615 24$aCyber-physical systems, IoT. 615 24$aProfessional Computing. 615 24$aSecurity Science and Technology. 676 $a005.8 700 $aAvoine$b Gildas$4edt$01354923 702 $aAvoine$b Gildas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHernandez-Castro$b Julio$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996464447403316 996 $aSecurity of Ubiquitous Computing Systems$93358695 997 $aUNISA