Abstract. As computing becomes pervasive, embedded systems are deployed in a wide range of domains, including industrial systems, critical infrastructures, private and public spaces as well as portable and wearable applications. An integral part of the functionality of these systems is the storage, access and transmission of private, sensitive or even critical information. Therefore, the confidentiality and integrity of the resources and services of said devices constitutes a prominent issue that must be considered during their design. There is a variety of cryptographic mechanisms which can be used to safeguard the confidentiality and integrity of stored and transmitted information. In the context of embedded systems, however, the problem ...
Passwords constitute the main mean for authentication in computer systems. In order to maintain the ...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of ThingsRecently, we...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "thi...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
Communications are one of the key functions in future vehicles and require protection. Cryptography ...
Abstract—Security issues become more and more important during the development of mobile devices. In...
The recent increase in performance of embedded processors has enabled the use of computationally hea...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
Passwords constitute the main mean for authentication in computer systems. In order to maintain the ...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of ThingsRecently, we...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "thi...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
Communications are one of the key functions in future vehicles and require protection. Cryptography ...
Abstract—Security issues become more and more important during the development of mobile devices. In...
The recent increase in performance of embedded processors has enabled the use of computationally hea...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
Passwords constitute the main mean for authentication in computer systems. In order to maintain the ...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of ThingsRecently, we...