Security and embedded systems /:
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Washington, D.C. :
IOS Press,
©2006.
|
Schriftenreihe: | NATO security through science series. Information and communication security ;
vol. 2. |
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Proceedings from the NATO Advanced Research Workshop on "Security and Embedded Systems." |
Beschreibung: | 1 online resource (xii, 203 pages) : illustrations. |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
Bibliographie: | Includes bibliographical references and author index. |
ISBN: | 1423797329 9781423797326 9781607501558 1607501554 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm71202776 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 060829s2006 ne a ob 101 0 eng d | ||
010 | |a 2005937976 | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d CUZ |d TXR |d IOSPR |d IDEBK |d OCLCE |d E7B |d OCLCQ |d TUU |d OCLCQ |d OCLCO |d FVL |d OCLCQ |d YDXCP |d OCLCO |d OCLCQ |d EBLCP |d DEBSZ |d OCLCO |d OCLCQ |d OCLCO |d AZK |d JBG |d MOR |d PIFAG |d ZCU |d MERUC |d HTC |d OCLCQ |d WY@ |d OCLCA |d LUE |d OCLCF |d BRL |d STF |d WRM |d VTS |d NRAMU |d ICG |d OCLCQ |d VT2 |d OCLCQ |d WYU |d A6Q |d DKC |d OCLCQ |d UKCRE |d OCLCO |d OCLCQ |d OCLCO |d INARC |d OCLCQ |d OCLCL | ||
019 | |a 320320155 |a 491259661 |a 606209057 |a 607734046 |a 614526035 |a 722472579 |a 728036782 |a 961587520 |a 962659329 |a 988462065 |a 992028536 |a 1037509145 |a 1038635607 |a 1045514923 |a 1055384427 |a 1066604507 |a 1076290986 |a 1081221050 |a 1153461862 |a 1228532039 |a 1330619543 |a 1407444025 | ||
020 | |a 1423797329 |q (electronic bk.) | ||
020 | |a 9781423797326 |q (electronic bk.) | ||
020 | |a 9781607501558 | ||
020 | |a 1607501554 | ||
020 | |z 1586035800 | ||
020 | |z 9781586035808 | ||
035 | |a (OCoLC)71202776 |z (OCoLC)320320155 |z (OCoLC)491259661 |z (OCoLC)606209057 |z (OCoLC)607734046 |z (OCoLC)614526035 |z (OCoLC)722472579 |z (OCoLC)728036782 |z (OCoLC)961587520 |z (OCoLC)962659329 |z (OCoLC)988462065 |z (OCoLC)992028536 |z (OCoLC)1037509145 |z (OCoLC)1038635607 |z (OCoLC)1045514923 |z (OCoLC)1055384427 |z (OCoLC)1066604507 |z (OCoLC)1076290986 |z (OCoLC)1081221050 |z (OCoLC)1153461862 |z (OCoLC)1228532039 |z (OCoLC)1330619543 |z (OCoLC)1407444025 | ||
037 | |a 978-1-58603-580-8 |b IOS Press |n http://www.iospress.nl | ||
042 | |a dlr | ||
050 | 4 | |a TK7895.E42 |b N27 2005eb | |
072 | 7 | |a COM |x COM014000 |2 bisacsh | |
082 | 7 | |a 004.16 |2 22 | |
049 | |a MAIN | ||
111 | 2 | |a NATO Advanced Research Workshop on Security and Embedded Systems |d (2005 Aug. 22-26 : |c Patras, Greece) | |
245 | 1 | 0 | |a Security and embedded systems / |c edited by Dimitrios N. Serpanos and Ran Giladi. |
260 | |a Amsterdam ; |a Washington, D.C. : |b IOS Press, |c ©2006. | ||
300 | |a 1 online resource (xii, 203 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
490 | 1 | |a NATO security through science series. D : Information and communication security ; |v vol. 2 | |
500 | |a Proceedings from the NATO Advanced Research Workshop on "Security and Embedded Systems." | ||
504 | |a Includes bibliographical references and author index. | ||
588 | 0 | |a Print version record. | |
506 | |3 Use copy |f Restrictions unspecified |2 star |5 MiAaHDL | ||
533 | |a Electronic reproduction. |b [S.l.] : |c HathiTrust Digital Library, |d 2010. |5 MiAaHDL | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |u http://purl.oclc.org/DLF/benchrepro0212 |5 MiAaHDL | ||
583 | 1 | |a digitized |c 2010 |h HathiTrust Digital Library |l committed to preserve |2 pda |5 MiAaHDL | |
505 | 0 | 0 | |t Chaotic routing as a method of an information conversion / |r Y.P. Shankin -- |t Combinatorial game models for security systems / |r Edward Pogossian -- |t Architectural enhancements for secure embedded processing / |r Divya Arora, Srivaths Ravi, Anand Raghunathan and Niraj K. Jha -- |t Computational improvements to differential side channel analysis / |r David Nacache, Michael Tunstall and Claire Whelan -- |t A process algebra approach to authentication and secrecy / |r Lacramioara Astefanoaei and Gabriel Ciobanu -- |t Intellectual property protection using embedded systems / |r A.G. Fragopoulos and D.N. Serpanos -- |t Challenges in deeply networked system survivability / |r Philip Koopman, Jennifer Morris and Priya Narasimhan -- |t Multimedia watermarking / |r Bede Liu -- |t A platform for designing secure embedded systems / |r Haris Lekatsas, Jorg Henkel, Venkata Jakkula and Srimat Chakradhar -- |t Cryptographic insecurity of the test & repeat paradigm / |r Tomas Rosa -- |t A privacy classification model based on linkability valuation / |r Dan Cvrcek, Vashek Matyas and Marek Kumpost -- |t A run-time reconfigurable architecture for embedded program flow verification / |r Joseph Zambreno, Tanathil Anish and Alok Choudhary -- |t Model-based validation of enterprise access policies / |r Sandeep Bhatt, William Horne, Joe Pato, Raj Rajagopalan and Prasad Rao -- |t Research issues in homeland security / |r Theodoros Zachariadis -- |t Assurance in autonomous decentralized embedded system / |r Kinji Mori. |
505 | 8 | 0 | |t Vulnerabilities and countermeasures for embedded processors / |r Shengqi Yang, Wayne Wolf, N. Vijakrishnan, Yuan Xie and Dimitrios Serpanos -- |t Agent-based modeling and simulation of malefactors' attacks against computer networks / |r Igor Kotenko, Mihail Stepashkin and Alexander Ulanov -- |t Current problems in security of military networks / |r Jaroslav Dockal and Pavel Pokorny -- |t Multi-agent framework for intrusion detection and alert correlation / |r Vladimir Gorodetsky, Oleg Karsaev, Valdimir Samoilov and Alexander Ulanov -- |t Securing home and building automation systems using the zPnP approach / |r Ran Giladi -- |t REWARD : a routing method for ad-hoc networks with adjustable security capability / |r Zdravko Karakehayov and Ivan Radev -- |t On the security of the GSM cellular network / |r Elad Barkan and Eli Biham -- |t Telecommunications fraud & electronic crime in fix and mobile embedded systems / |r Michalis Mavis. |
650 | 0 | |a Embedded computer systems |x Security measures |v Congresses. | |
650 | 0 | |a Computer security |v Congresses. | |
650 | 6 | |a Systèmes enfouis (Informatique) |x Sécurité |x Mesures |v Congrès. | |
650 | 6 | |a Sécurité informatique |v Congrès. | |
650 | 7 | |a COMPUTERS |x Hardware |x Personal Computers |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x Handheld Devices. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Microprocessors. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
655 | 7 | |a Conference papers and proceedings |2 fast | |
700 | 1 | |a Giladi, Ran. |0 http://id.loc.gov/authorities/names/nb2006011717 | |
700 | 1 | |a Serpanos, Dimitrios Nikolaou. |0 http://id.loc.gov/authorities/names/nr90015408 | |
758 | |i has work: |a Security and embedded systems (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGVHGFfwvYFr8p9ckdh8RX |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a NATO Advanced Research Workshop on Security and Embedded Systems (2005 Aug. 22-26 : Patras, Greece). |t Security and embedded systems. |d Amsterdam ; Washington, D.C. : IOS Press, ©2006 |z 1586035800 |w (DLC) 2005937976 |w (OCoLC)65638157 |
830 | 0 | |a NATO security through science series. |n D, |p Information and communication security ; |v vol. 2. |0 http://id.loc.gov/authorities/names/no2006064032 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=164050 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL265974 | ||
938 | |a ebrary |b EBRY |n ebr10130650 | ||
938 | |a EBSCOhost |b EBSC |n 164050 | ||
938 | |a YBP Library Services |b YANK |n 2468026 | ||
938 | |a YBP Library Services |b YANK |n 3207172 | ||
938 | |a Internet Archive |b INAR |n securityembedded0000unse | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm71202776 |
---|---|
_version_ | 1816881641147072512 |
adam_text | |
any_adam_object | |
author2 | Giladi, Ran Serpanos, Dimitrios Nikolaou |
author2_role | |
author2_variant | r g rg d n s dn dns |
author_GND | http://id.loc.gov/authorities/names/nb2006011717 http://id.loc.gov/authorities/names/nr90015408 |
author_additional | Y.P. Shankin -- Edward Pogossian -- Divya Arora, Srivaths Ravi, Anand Raghunathan and Niraj K. Jha -- David Nacache, Michael Tunstall and Claire Whelan -- Lacramioara Astefanoaei and Gabriel Ciobanu -- A.G. Fragopoulos and D.N. Serpanos -- Philip Koopman, Jennifer Morris and Priya Narasimhan -- Bede Liu -- Haris Lekatsas, Jorg Henkel, Venkata Jakkula and Srimat Chakradhar -- Tomas Rosa -- Dan Cvrcek, Vashek Matyas and Marek Kumpost -- Joseph Zambreno, Tanathil Anish and Alok Choudhary -- Sandeep Bhatt, William Horne, Joe Pato, Raj Rajagopalan and Prasad Rao -- Theodoros Zachariadis -- Kinji Mori. Shengqi Yang, Wayne Wolf, N. Vijakrishnan, Yuan Xie and Dimitrios Serpanos -- Igor Kotenko, Mihail Stepashkin and Alexander Ulanov -- Jaroslav Dockal and Pavel Pokorny -- Vladimir Gorodetsky, Oleg Karsaev, Valdimir Samoilov and Alexander Ulanov -- Ran Giladi -- Zdravko Karakehayov and Ivan Radev -- Elad Barkan and Eli Biham -- Michalis Mavis. |
author_corporate | NATO Advanced Research Workshop on Security and Embedded Systems Patras, Greece |
author_corporate_role | |
author_facet | Giladi, Ran Serpanos, Dimitrios Nikolaou NATO Advanced Research Workshop on Security and Embedded Systems Patras, Greece |
author_sort | NATO Advanced Research Workshop on Security and Embedded Systems Patras, Greece |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK7895 |
callnumber-raw | TK7895.E42 N27 2005eb |
callnumber-search | TK7895.E42 N27 2005eb |
callnumber-sort | TK 47895 E42 N27 42005EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Chaotic routing as a method of an information conversion / Combinatorial game models for security systems / Architectural enhancements for secure embedded processing / Computational improvements to differential side channel analysis / A process algebra approach to authentication and secrecy / Intellectual property protection using embedded systems / Challenges in deeply networked system survivability / Multimedia watermarking / A platform for designing secure embedded systems / Cryptographic insecurity of the test & repeat paradigm / A privacy classification model based on linkability valuation / A run-time reconfigurable architecture for embedded program flow verification / Model-based validation of enterprise access policies / Research issues in homeland security / Assurance in autonomous decentralized embedded system / Vulnerabilities and countermeasures for embedded processors / Agent-based modeling and simulation of malefactors' attacks against computer networks / Current problems in security of military networks / Multi-agent framework for intrusion detection and alert correlation / Securing home and building automation systems using the zPnP approach / REWARD : a routing method for ad-hoc networks with adjustable security capability / On the security of the GSM cellular network / Telecommunications fraud & electronic crime in fix and mobile embedded systems / |
ctrlnum | (OCoLC)71202776 |
dewey-full | 004.16 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.16 |
dewey-search | 004.16 |
dewey-sort | 14.16 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07227cam a2200769 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm71202776 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">060829s2006 ne a ob 101 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2005937976</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CUZ</subfield><subfield code="d">TXR</subfield><subfield code="d">IOSPR</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCE</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">FVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AZK</subfield><subfield code="d">JBG</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">HTC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WY@</subfield><subfield code="d">OCLCA</subfield><subfield code="d">LUE</subfield><subfield code="d">OCLCF</subfield><subfield code="d">BRL</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">A6Q</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKCRE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">320320155</subfield><subfield code="a">491259661</subfield><subfield code="a">606209057</subfield><subfield code="a">607734046</subfield><subfield code="a">614526035</subfield><subfield code="a">722472579</subfield><subfield code="a">728036782</subfield><subfield code="a">961587520</subfield><subfield code="a">962659329</subfield><subfield code="a">988462065</subfield><subfield code="a">992028536</subfield><subfield code="a">1037509145</subfield><subfield code="a">1038635607</subfield><subfield code="a">1045514923</subfield><subfield code="a">1055384427</subfield><subfield code="a">1066604507</subfield><subfield code="a">1076290986</subfield><subfield code="a">1081221050</subfield><subfield code="a">1153461862</subfield><subfield code="a">1228532039</subfield><subfield code="a">1330619543</subfield><subfield code="a">1407444025</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423797329</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423797326</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607501558</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607501554</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1586035800</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781586035808</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)71202776</subfield><subfield code="z">(OCoLC)320320155</subfield><subfield code="z">(OCoLC)491259661</subfield><subfield code="z">(OCoLC)606209057</subfield><subfield code="z">(OCoLC)607734046</subfield><subfield code="z">(OCoLC)614526035</subfield><subfield code="z">(OCoLC)722472579</subfield><subfield code="z">(OCoLC)728036782</subfield><subfield code="z">(OCoLC)961587520</subfield><subfield code="z">(OCoLC)962659329</subfield><subfield code="z">(OCoLC)988462065</subfield><subfield code="z">(OCoLC)992028536</subfield><subfield code="z">(OCoLC)1037509145</subfield><subfield code="z">(OCoLC)1038635607</subfield><subfield code="z">(OCoLC)1045514923</subfield><subfield code="z">(OCoLC)1055384427</subfield><subfield code="z">(OCoLC)1066604507</subfield><subfield code="z">(OCoLC)1076290986</subfield><subfield code="z">(OCoLC)1081221050</subfield><subfield code="z">(OCoLC)1153461862</subfield><subfield code="z">(OCoLC)1228532039</subfield><subfield code="z">(OCoLC)1330619543</subfield><subfield code="z">(OCoLC)1407444025</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">978-1-58603-580-8</subfield><subfield code="b">IOS Press</subfield><subfield code="n">http://www.iospress.nl</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">dlr</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK7895.E42</subfield><subfield code="b">N27 2005eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">COM014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.16</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">NATO Advanced Research Workshop on Security and Embedded Systems</subfield><subfield code="d">(2005 Aug. 22-26 :</subfield><subfield code="c">Patras, Greece)</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and embedded systems /</subfield><subfield code="c">edited by Dimitrios N. Serpanos and Ran Giladi.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Washington, D.C. :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">©2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 203 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">NATO security through science series. D : Information and communication security ;</subfield><subfield code="v">vol. 2</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Proceedings from the NATO Advanced Research Workshop on "Security and Embedded Systems."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and author index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="3">Use copy</subfield><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction.</subfield><subfield code="b">[S.l.] :</subfield><subfield code="c">HathiTrust Digital Library,</subfield><subfield code="d">2010.</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield><subfield code="u">http://purl.oclc.org/DLF/benchrepro0212</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">digitized</subfield><subfield code="c">2010</subfield><subfield code="h">HathiTrust Digital Library</subfield><subfield code="l">committed to preserve</subfield><subfield code="2">pda</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Chaotic routing as a method of an information conversion /</subfield><subfield code="r">Y.P. Shankin --</subfield><subfield code="t">Combinatorial game models for security systems /</subfield><subfield code="r">Edward Pogossian --</subfield><subfield code="t">Architectural enhancements for secure embedded processing /</subfield><subfield code="r">Divya Arora, Srivaths Ravi, Anand Raghunathan and Niraj K. Jha --</subfield><subfield code="t">Computational improvements to differential side channel analysis /</subfield><subfield code="r">David Nacache, Michael Tunstall and Claire Whelan --</subfield><subfield code="t">A process algebra approach to authentication and secrecy /</subfield><subfield code="r">Lacramioara Astefanoaei and Gabriel Ciobanu --</subfield><subfield code="t">Intellectual property protection using embedded systems /</subfield><subfield code="r">A.G. Fragopoulos and D.N. Serpanos --</subfield><subfield code="t">Challenges in deeply networked system survivability /</subfield><subfield code="r">Philip Koopman, Jennifer Morris and Priya Narasimhan --</subfield><subfield code="t">Multimedia watermarking /</subfield><subfield code="r">Bede Liu --</subfield><subfield code="t">A platform for designing secure embedded systems /</subfield><subfield code="r">Haris Lekatsas, Jorg Henkel, Venkata Jakkula and Srimat Chakradhar --</subfield><subfield code="t">Cryptographic insecurity of the test & repeat paradigm /</subfield><subfield code="r">Tomas Rosa --</subfield><subfield code="t">A privacy classification model based on linkability valuation /</subfield><subfield code="r">Dan Cvrcek, Vashek Matyas and Marek Kumpost --</subfield><subfield code="t">A run-time reconfigurable architecture for embedded program flow verification /</subfield><subfield code="r">Joseph Zambreno, Tanathil Anish and Alok Choudhary --</subfield><subfield code="t">Model-based validation of enterprise access policies /</subfield><subfield code="r">Sandeep Bhatt, William Horne, Joe Pato, Raj Rajagopalan and Prasad Rao --</subfield><subfield code="t">Research issues in homeland security /</subfield><subfield code="r">Theodoros Zachariadis --</subfield><subfield code="t">Assurance in autonomous decentralized embedded system /</subfield><subfield code="r">Kinji Mori.</subfield></datafield><datafield tag="505" ind1="8" ind2="0"><subfield code="t">Vulnerabilities and countermeasures for embedded processors /</subfield><subfield code="r">Shengqi Yang, Wayne Wolf, N. Vijakrishnan, Yuan Xie and Dimitrios Serpanos --</subfield><subfield code="t">Agent-based modeling and simulation of malefactors' attacks against computer networks /</subfield><subfield code="r">Igor Kotenko, Mihail Stepashkin and Alexander Ulanov --</subfield><subfield code="t">Current problems in security of military networks /</subfield><subfield code="r">Jaroslav Dockal and Pavel Pokorny --</subfield><subfield code="t">Multi-agent framework for intrusion detection and alert correlation /</subfield><subfield code="r">Vladimir Gorodetsky, Oleg Karsaev, Valdimir Samoilov and Alexander Ulanov --</subfield><subfield code="t">Securing home and building automation systems using the zPnP approach /</subfield><subfield code="r">Ran Giladi --</subfield><subfield code="t">REWARD : a routing method for ad-hoc networks with adjustable security capability /</subfield><subfield code="r">Zdravko Karakehayov and Ivan Radev --</subfield><subfield code="t">On the security of the GSM cellular network /</subfield><subfield code="r">Elad Barkan and Eli Biham --</subfield><subfield code="t">Telecommunications fraud & electronic crime in fix and mobile embedded systems /</subfield><subfield code="r">Michalis Mavis.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Embedded computer systems</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Systèmes enfouis (Informatique)</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">Personal Computers</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">Handheld Devices.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Microprocessors.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Conference papers and proceedings</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Giladi, Ran.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2006011717</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Serpanos, Dimitrios Nikolaou.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nr90015408</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Security and embedded systems (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGVHGFfwvYFr8p9ckdh8RX</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">NATO Advanced Research Workshop on Security and Embedded Systems (2005 Aug. 22-26 : Patras, Greece).</subfield><subfield code="t">Security and embedded systems.</subfield><subfield code="d">Amsterdam ; Washington, D.C. : IOS Press, ©2006</subfield><subfield code="z">1586035800</subfield><subfield code="w">(DLC) 2005937976</subfield><subfield code="w">(OCoLC)65638157</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">NATO security through science series.</subfield><subfield code="n">D,</subfield><subfield code="p">Information and communication security ;</subfield><subfield code="v">vol. 2.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2006064032</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=164050</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL265974</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10130650</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">164050</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2468026</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3207172</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">securityembedded0000unse</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Conference papers and proceedings fast |
genre_facet | Conference papers and proceedings |
id | ZDB-4-EBA-ocm71202776 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:57Z |
institution | BVB |
isbn | 1423797329 9781423797326 9781607501558 1607501554 |
language | English |
lccn | 2005937976 |
oclc_num | 71202776 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xii, 203 pages) : illustrations. |
psigel | ZDB-4-EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | IOS Press, |
record_format | marc |
series | NATO security through science series. Information and communication security ; |
series2 | NATO security through science series. D : Information and communication security ; |
spelling | NATO Advanced Research Workshop on Security and Embedded Systems (2005 Aug. 22-26 : Patras, Greece) Security and embedded systems / edited by Dimitrios N. Serpanos and Ran Giladi. Amsterdam ; Washington, D.C. : IOS Press, ©2006. 1 online resource (xii, 203 pages) : illustrations. text txt rdacontent computer c rdamedia online resource cr rdacarrier data file rda NATO security through science series. D : Information and communication security ; vol. 2 Proceedings from the NATO Advanced Research Workshop on "Security and Embedded Systems." Includes bibliographical references and author index. Print version record. Use copy Restrictions unspecified star MiAaHDL Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010. MiAaHDL Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL Chaotic routing as a method of an information conversion / Y.P. Shankin -- Combinatorial game models for security systems / Edward Pogossian -- Architectural enhancements for secure embedded processing / Divya Arora, Srivaths Ravi, Anand Raghunathan and Niraj K. Jha -- Computational improvements to differential side channel analysis / David Nacache, Michael Tunstall and Claire Whelan -- A process algebra approach to authentication and secrecy / Lacramioara Astefanoaei and Gabriel Ciobanu -- Intellectual property protection using embedded systems / A.G. Fragopoulos and D.N. Serpanos -- Challenges in deeply networked system survivability / Philip Koopman, Jennifer Morris and Priya Narasimhan -- Multimedia watermarking / Bede Liu -- A platform for designing secure embedded systems / Haris Lekatsas, Jorg Henkel, Venkata Jakkula and Srimat Chakradhar -- Cryptographic insecurity of the test & repeat paradigm / Tomas Rosa -- A privacy classification model based on linkability valuation / Dan Cvrcek, Vashek Matyas and Marek Kumpost -- A run-time reconfigurable architecture for embedded program flow verification / Joseph Zambreno, Tanathil Anish and Alok Choudhary -- Model-based validation of enterprise access policies / Sandeep Bhatt, William Horne, Joe Pato, Raj Rajagopalan and Prasad Rao -- Research issues in homeland security / Theodoros Zachariadis -- Assurance in autonomous decentralized embedded system / Kinji Mori. Vulnerabilities and countermeasures for embedded processors / Shengqi Yang, Wayne Wolf, N. Vijakrishnan, Yuan Xie and Dimitrios Serpanos -- Agent-based modeling and simulation of malefactors' attacks against computer networks / Igor Kotenko, Mihail Stepashkin and Alexander Ulanov -- Current problems in security of military networks / Jaroslav Dockal and Pavel Pokorny -- Multi-agent framework for intrusion detection and alert correlation / Vladimir Gorodetsky, Oleg Karsaev, Valdimir Samoilov and Alexander Ulanov -- Securing home and building automation systems using the zPnP approach / Ran Giladi -- REWARD : a routing method for ad-hoc networks with adjustable security capability / Zdravko Karakehayov and Ivan Radev -- On the security of the GSM cellular network / Elad Barkan and Eli Biham -- Telecommunications fraud & electronic crime in fix and mobile embedded systems / Michalis Mavis. Embedded computer systems Security measures Congresses. Computer security Congresses. Systèmes enfouis (Informatique) Sécurité Mesures Congrès. Sécurité informatique Congrès. COMPUTERS Hardware Personal Computers General. bisacsh COMPUTERS Hardware Handheld Devices. bisacsh COMPUTERS Microprocessors. bisacsh Computer security fast Conference papers and proceedings fast Giladi, Ran. http://id.loc.gov/authorities/names/nb2006011717 Serpanos, Dimitrios Nikolaou. http://id.loc.gov/authorities/names/nr90015408 has work: Security and embedded systems (Text) https://id.oclc.org/worldcat/entity/E39PCGVHGFfwvYFr8p9ckdh8RX https://id.oclc.org/worldcat/ontology/hasWork Print version: NATO Advanced Research Workshop on Security and Embedded Systems (2005 Aug. 22-26 : Patras, Greece). Security and embedded systems. Amsterdam ; Washington, D.C. : IOS Press, ©2006 1586035800 (DLC) 2005937976 (OCoLC)65638157 NATO security through science series. D, Information and communication security ; vol. 2. http://id.loc.gov/authorities/names/no2006064032 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=164050 Volltext |
spellingShingle | Security and embedded systems / NATO security through science series. Information and communication security ; Chaotic routing as a method of an information conversion / Combinatorial game models for security systems / Architectural enhancements for secure embedded processing / Computational improvements to differential side channel analysis / A process algebra approach to authentication and secrecy / Intellectual property protection using embedded systems / Challenges in deeply networked system survivability / Multimedia watermarking / A platform for designing secure embedded systems / Cryptographic insecurity of the test & repeat paradigm / A privacy classification model based on linkability valuation / A run-time reconfigurable architecture for embedded program flow verification / Model-based validation of enterprise access policies / Research issues in homeland security / Assurance in autonomous decentralized embedded system / Vulnerabilities and countermeasures for embedded processors / Agent-based modeling and simulation of malefactors' attacks against computer networks / Current problems in security of military networks / Multi-agent framework for intrusion detection and alert correlation / Securing home and building automation systems using the zPnP approach / REWARD : a routing method for ad-hoc networks with adjustable security capability / On the security of the GSM cellular network / Telecommunications fraud & electronic crime in fix and mobile embedded systems / Embedded computer systems Security measures Congresses. Computer security Congresses. Systèmes enfouis (Informatique) Sécurité Mesures Congrès. Sécurité informatique Congrès. COMPUTERS Hardware Personal Computers General. bisacsh COMPUTERS Hardware Handheld Devices. bisacsh COMPUTERS Microprocessors. bisacsh Computer security fast |
title | Security and embedded systems / |
title_alt | Chaotic routing as a method of an information conversion / Combinatorial game models for security systems / Architectural enhancements for secure embedded processing / Computational improvements to differential side channel analysis / A process algebra approach to authentication and secrecy / Intellectual property protection using embedded systems / Challenges in deeply networked system survivability / Multimedia watermarking / A platform for designing secure embedded systems / Cryptographic insecurity of the test & repeat paradigm / A privacy classification model based on linkability valuation / A run-time reconfigurable architecture for embedded program flow verification / Model-based validation of enterprise access policies / Research issues in homeland security / Assurance in autonomous decentralized embedded system / Vulnerabilities and countermeasures for embedded processors / Agent-based modeling and simulation of malefactors' attacks against computer networks / Current problems in security of military networks / Multi-agent framework for intrusion detection and alert correlation / Securing home and building automation systems using the zPnP approach / REWARD : a routing method for ad-hoc networks with adjustable security capability / On the security of the GSM cellular network / Telecommunications fraud & electronic crime in fix and mobile embedded systems / |
title_auth | Security and embedded systems / |
title_exact_search | Security and embedded systems / |
title_full | Security and embedded systems / edited by Dimitrios N. Serpanos and Ran Giladi. |
title_fullStr | Security and embedded systems / edited by Dimitrios N. Serpanos and Ran Giladi. |
title_full_unstemmed | Security and embedded systems / edited by Dimitrios N. Serpanos and Ran Giladi. |
title_short | Security and embedded systems / |
title_sort | security and embedded systems |
topic | Embedded computer systems Security measures Congresses. Computer security Congresses. Systèmes enfouis (Informatique) Sécurité Mesures Congrès. Sécurité informatique Congrès. COMPUTERS Hardware Personal Computers General. bisacsh COMPUTERS Hardware Handheld Devices. bisacsh COMPUTERS Microprocessors. bisacsh Computer security fast |
topic_facet | Embedded computer systems Security measures Congresses. Computer security Congresses. Systèmes enfouis (Informatique) Sécurité Mesures Congrès. Sécurité informatique Congrès. COMPUTERS Hardware Personal Computers General. COMPUTERS Hardware Handheld Devices. COMPUTERS Microprocessors. Computer security Conference papers and proceedings |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=164050 |
work_keys_str_mv | AT natoadvancedresearchworkshoponsecurityandembeddedsystemspatrasgreece securityandembeddedsystems AT giladiran securityandembeddedsystems AT serpanosdimitriosnikolaou securityandembeddedsystems |