Book Name: | [PDF] Design Methodologies for Secure Embedded Systems |
Free Download: | Available |
Design Methodologies for Secure Embedded Systems :: Content: Towards Co-design of HW/SW/Analog Systems Christoph Grimm, Markus Damm, and Jan HaaseA Flexible Hierarchical Approach for Controlling the System-Level Design Complexity of Embedded Systems Stephan KlausSide-Channel Analysis – Mathematics Has Met Engineering Survey of Methods to Improve Side-Channel Resistance on Partial Reconfigurable Platforms Marc St¨ottinger, Sunil Malipatlolla, and Qizhi Tian Multicast Rekeying: Performance Evaluation Abdulhadi Shoufan and Tolga Arul Robustness Analysis of Watermark Verification Techniques for FPGA Netlist Cores Daniel Ziener, Moritz Schmid, and J¨urgen Teich Efficient and Flexible Co-processor for Server-Based Public Key Cryptography Applications Ralf Laue Cellular-Array Implementations of Bio-inspired Self-healing Systems State of the Art and Future Perspectives Andr´e Seffrin and Alexander Biedermann Combined Man-in-the-Loop and Software-in-the-Loop Simulation: Electronic Stability Program for Trucks on the Daimler Driving Simulator Uwe Baake and Klaus W¨ust Secure Beamforming for Weather Hazard Warning Application in Car-to-X Communication Hagen St¨ubing and Attila Jaeger
Design Methodologies for Secure Embedded Systems
Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss
Author(s): Christoph Grimm, Markus Damm, Jan Haase (auth.), Alexander Biedermann, H. Gregor Molter (eds.)
Series: Lecture Notes in Electrical Engineering 78
Publisher: Springer-Verlag Berlin Heidelberg, Year: 2011
ISBN: 3642167667
[PDF] Design Methodologies for Secure Embedded Systems Table Of Contents
Front Matter….Pages –
Towards Co-design of HW/SW/Analog Systems….Pages 1-24
A Flexible Hierarchical Approach for Controlling the System-Level Design Complexity of Embedded Systems….Pages 25-42
Side-Channel Analysis – Mathematics Has Met Engineering….Pages 43-62
Survey of Methods to Improve Side-Channel Resistance on Partial Reconfigurable Platforms….Pages 63-84
Multicast Rekeying: Performance Evaluation….Pages 85-104
Robustness Analysis of Watermark Verification Techniques for FPGA Netlist Cores….Pages 105-127
Efficient and Flexible Co-processor for Server-Based Public Key Cryptography Applications….Pages 129-149
Cellular-Array Implementations of Bio-inspired Self-healing Systems: State of the Art and Future Perspectives….Pages 151-170
Combined Man-in-the-Loop and Software-in-the-Loop Simulation….Pages 171-185
Secure Beamforming for Weather Hazard Warning Application in Car-to-X Communication….Pages 187-206
Back Matter….Pages –