Abstract is missing.
- Errata to: Secure Smart Embedded Devices, Platforms and ApplicationsKonstantinos Markantonakis, Keith Mayes. [doi]
- Errata to: Secure Smart Embedded Devices, Platforms and ApplicationsKonstantinos Markantonakis, Keith Mayes. [doi]
- An Introduction to Smart Cards and RFIDsKeith Mayes, Konstantinos Markantonakis. 3-25 [doi]
- Embedded DSP DevicesSerendra Reddy. 27-48 [doi]
- Microprocessors and Microcontrollers SecurityChris Shire. 49-69 [doi]
- An Introduction to the Trusted Platform Module and Mobile Trusted ModuleRaja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 71-93 [doi]
- Hardware and VLSI DesignsMario Kirschbaum, Thomas Plos. 95-116 [doi]
- Information Security Best PracticesKeith Mayes, Konstantinos Markantonakis. 119-144 [doi]
- Smart Card SecurityMichael Tunstall. 145-177 [doi]
- Graphics Processing UnitsPeter Schwabe. 179-200 [doi]
- A Survey of Recent Results in FPGA Security and Intellectual Property ProtectionFrançois Durvaux, Stéphanie Kerckhof, Francesco Regazzoni, François-Xavier Standaert. 201-224 [doi]
- Mobile Communication Security ControllersKeith Mayes, Konstantinos Markantonakis. 227-266 [doi]
- Security of Embedded Location SystemsGerhard P. Hancke. 267-286 [doi]
- Automotive Embedded Systems Applications and Platform Embedded Security RequirementsJan Pelzl, Marko Wolf, Thomas J. Wollinger. 287-309 [doi]
- Analysis of Potential Vulnerabilities in Payment TerminalsKonstantinos Rantos, Konstantinos Markantonakis. 311-333 [doi]
- Wireless Sensor NodesSerge Chaumette, Damien Sauveron. 335-350 [doi]
- Near Field CommunicationGerald Madlmayr, Christian Kantner, Thomas Grechenig. 351-367 [doi]
- The BIOS and RootkitsGraham Hili, Keith Mayes, Konstantinos Markantonakis. 369-381 [doi]
- Hardware Security ModulesStathis Mavrovouniotis, Mick Ganley. 383-405 [doi]
- Security Evaluation and Common CriteriaTony Boswell. 407-427 [doi]
- Physical Security Primitives - A Survey on Physically Unclonable Functions and PUF-Based Security SolutionsAhmad-Reza Sadeghi, Steffen Schulz 0001, Christian Wachsmann. 429-449 [doi]
- SCADA System Cyber SecurityIgor Nai Fovino. 451-471 [doi]
- An Overview of PIC Microcontrollers and Their Suitability for Cryptographic AlgorithmsMehari G. Msgna, Colin D. Walter. 475-495 [doi]
- An Introduction to Java Card ProgrammingRaja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 497-513 [doi]
- A Practical Example of Mobile Phone Application Using SATSA (JSR 177) APILishoy Francis. 515-539 [doi]
- Wireless Sensors (Languages/Programming/Developments Tools/Examples)Jérémie Albert, Lionel Barrère, Serge Chaumette, Damien Sauveron. 541-564 [doi]