000 | 03283nam a22004935i 4500 | ||
---|---|---|---|
001 | u375397 | ||
003 | SIRSI | ||
005 | 20160812084322.0 | ||
007 | cr nn 008mamaa | ||
008 | 101127s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642167676 _9978-3-642-16767-6 |
||
040 | _cMX-MeUAM | ||
050 | 4 | _aTK7888.4 | |
082 | 0 | 4 |
_a621.3815 _223 |
100 | 1 |
_aBiedermann, Alexander. _eeditor. |
|
245 | 1 | 0 |
_aDesign Methodologies for Secure Embedded Systems _h[recurso electrónico] : _bFestschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss / _cedited by Alexander Biedermann, H. Gregor Molter. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2011. |
|
300 |
_a204p. 91 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Electrical Engineering, _x1876-1100 ; _v78 |
|
505 | 0 | _aTowards Co-Design of HW/SW/Analog Systems -- A Flexible Hierarchical Approach for Controlling the System-Level -- Side-Channel Analysis { Mathematics Has Met Engineering -- Survey of Methods to Improve Side-Channel Resistance on Partial Recongurable Platforms -- Multicast Rekeying: Performance Evaluation -- Robustness Analysis of Watermark Veri cation Techniques for FPGA Netlist Cores -- Efficient and Flexible Co-Processor for Server-based Public Key Cryptography Applications -- Cellular-Array Implementations of Bio-Inspired Self-Healing Systems -- State of the Art and Future Perspectives -- Combined Man-in-the-Loop and Software-in-the-Loop Simulation -- Secure Beamforming for Weather Hazard Warning Application in Car-to-X Communication. | |
520 | _aEmbedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday. | ||
650 | 0 | _aEngineering. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aComputer engineering. | |
650 | 0 | _aSystems engineering. | |
650 | 1 | 4 | _aEngineering. |
650 | 2 | 4 | _aCircuits and Systems. |
650 | 2 | 4 | _aControl, Robotics, Mechatronics. |
650 | 2 | 4 | _aElectrical Engineering. |
650 | 2 | 4 | _aSpecial Purpose and Application-Based Systems. |
700 | 1 |
_aMolter, H. Gregor. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642167669 |
830 | 0 |
_aLecture Notes in Electrical Engineering, _x1876-1100 ; _v78 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-16767-6 |
596 | _a19 | ||
942 | _cLIBRO_ELEC | ||
999 |
_c203277 _d203277 |