TY - BOOK ID - 80746388 TI - Security of Ubiquitous Computing Systems : Selected Topics AU - Avoine, Gildas AU - Avoine, Gildas. AU - Hernandez-Castro, Julio. PY - 2021 SN - 3030105911 3030105903 PB - Springer Nature DB - UniCat KW - Computer security. KW - Computer engineering. KW - Internet of things. KW - Embedded computer systems. KW - Computer software. KW - System safety. KW - Systems and Data Security. KW - Cyber-physical systems, IoT. KW - Professional Computing. KW - Security Science and Technology. KW - Safety, System KW - Safety of systems KW - Systems safety KW - Accidents KW - Industrial safety KW - Systems engineering KW - Software, Computer KW - Computer systems KW - Embedded systems (Computer systems) KW - Architecture Analysis and Design Language KW - Computers KW - IoT (Computer networks) KW - Things, Internet of KW - Computer networks KW - Embedded Internet devices KW - Machine-to-machine communications KW - Computer privacy KW - Computer system security KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - Prevention KW - Design and construction KW - Protection KW - Security measures KW - Systems and Data Security KW - Cyber-physical systems, IoT KW - Professional Computing KW - Security Science and Technology KW - Data and Information Security KW - Internet of Things KW - Cryptology KW - Cryptacus KW - Security KW - Ubiquitous Devices KW - Lightweight Cryptography KW - Symmetric Cryptography KW - Side-Channel Analysis KW - IoT Security KW - Ubiquitous Computing Systems KW - Open Access KW - Computer security KW - Network security KW - Electrical engineering KW - Cybernetics & systems theory KW - Applied computing KW - Security & fire alarm systems UR - https://www.unicat.be/uniCat?func=search&query=sysid:80746388 AB - The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license. ER -