Academic literature on the topic 'Embedded system security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Embedded system security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Embedded system security"

1

Koopman, P. "Embedded system security." Computer 37, no. 7 (2004): 95–97. http://dx.doi.org/10.1109/mc.2004.52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Al_Dosary, Duaa, Khattab M. Ali Alheeti, and Salah Sleibi Al-Rawi. "ICMetric Security System for Achieving Embedded Devices Security." Journal of Physics: Conference Series 1804, no. 1 (2021): 012102. http://dx.doi.org/10.1088/1742-6596/1804/1/012102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Savitha, A. C., Kumar KM Madhu, S. S. Niharika, M. S. Nisarga, and Ganapati Hegde Praghathi. "Comprehensive Security Issues in Embedded System Design." Journal of Scholastic Engineering Science and Management (JSESM), A Peer Reviewed Universities Refereed Multidisciplinary Research Journal 4, no. 5 (2025): 31–37. https://doi.org/10.5281/zenodo.15393065.

Full text
Abstract:
Many modern electronic systems---including personal computers, PDAs, cell phones, network routers, smart cards, and networked sensors to name a few---need to access, store, manipulate, or communicate sensitive information, making security a serious concern in their design. Embedded systems, which account for a wide range of products from the electronics, semiconductor, telecommunications, and networking industries, face some of the most demanding security concerns on the one hand, they are often highly resource constrained, while on the other hand, they frequently need to operate in physically
APA, Harvard, Vancouver, ISO, and other styles
4

Mehul P. Barot, Ramesh T. Prajapati, Darshan P. Patel, Hitesh H. Wandra,. "Embedded Systems Based Intelligent Bank Locker Security System." Tuijin Jishu/Journal of Propulsion Technology 44, no. 5 (2023): 1770–76. http://dx.doi.org/10.52783/tjjpt.v44.i5.2854.

Full text
Abstract:
Nowadays, security plays a big role, notably in homes, companies, and banks. This article uses embedded systems to design a bank locker security system. The Global System for Mobile (GSM) and Radio Frequency Identification (RFID) technologies are the foundation of this system. Only honest people are permitted to retrieve money or gold from bank lockers. It is created by fusing RFID and GSM technologies, allowing for real-time activation, authentication, and validation of the user and door unlocking for safe access to bank lockers. GSM and passive RFID are safer than other technologies. A micro
APA, Harvard, Vancouver, ISO, and other styles
5

Bhaskar. S et al.,, Bhaskar S. et al ,. "Impenetrable Security System Using Embedded Softwares." International Journal of Electronics, Communication & Instrumentation Engineering Research and Development 9, no. 2 (2019): 17–24. http://dx.doi.org/10.24247/ijecierddec20193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Murphy, N. "Sleight of hand [embedded system security]." Electronics Systems and Software 2, no. 5 (2004): 32–35. http://dx.doi.org/10.1049/ess:20040505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Selokar, Pradip Ram, and P. T. Karule. "Security Enhancement in Networked Embedded System." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (2017): 1867. http://dx.doi.org/10.11591/ijece.v7i4.pp1867-1873.

Full text
Abstract:
<span>In the developed system ARM9 is a master and Two ARM7s are slaves. The peripherals are being controlled by two ARM7 boards. The Peripherals are connected to the ARM7 through Complex Programmable Logic Device (CPLD). The CPLD is in turn connected to the ARM7 using Serial Peripheral Interface (SPI). The ARM7 boards collect the information from the peripherals and send it to the ARM9 board. The communication between ARM7 and ARM9 is via UART (Universal Asynchronous Receiver Transmitter) over CAN (Controller Area Network). The ARM9 board has got the software intelligence. The ARM9 beha
APA, Harvard, Vancouver, ISO, and other styles
8

Pradip, Ram Selokar, and T. Karule P. "Security Enhancement in Networked Embedded System." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (2017): 1867–73. https://doi.org/10.11591/ijece.v7i4.pp1867-1873.

Full text
Abstract:
In the developed system ARM9 is a master and Two ARM7s are slaves. The peripherals are being controlled by two ARM7 boards. The Peripherals are connected to the ARM7 through Complex Programmable Logic Device (CPLD). The CPLD is in turn connected to the ARM7 using Serial Peripheral Interface (SPI). The ARM7 boards collect the information from the peripherals and send it to the ARM9 board. The communication between ARM7 and ARM9 is via UART (Universal Asynchronous Receiver Transmitter) over CAN (Controller Area Network). The ARM9 board has got the software intelligence. The ARM9 behaves as a mas
APA, Harvard, Vancouver, ISO, and other styles
9

Lokesh, P. "Embedded system-based enhanced smart security systems for intelligent monitoring applications: A review." i-manager’s Journal on Embedded Systems 12, no. 1 (2023): 16. http://dx.doi.org/10.26634/jes.12.1.20369.

Full text
Abstract:
The advanced smart security system uses palm vein technology and machine learning to enhance authentication. It combines biometric data with behavioral analysis, continuously adapting to improve security. AI integration allows for anomaly detection, distinguishing normal user interactions from suspicious activities. The user-friendly interface makes it accessible for various applications, ensuring resilient protection against evolving threats. The palm vein technology not only enhances security but also minimizes the risk of false positives and negatives, ensuring a reliable and efficient auth
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Xu Hui. "The Research on Embedded Real-Time System Security Issues in Mechanical Control." Advanced Materials Research 681 (April 2013): 65–71. http://dx.doi.org/10.4028/www.scientific.net/amr.681.65.

Full text
Abstract:
Embedded real-time systems are facing more and more security problems. Malicious attacks on the system from suspicious or malicious code and the change of system hardware state could lead to system exception, resulting in system reliability and security deteriorated. This paper summarizes the characteristics of embedded real-time system and its special requirements for security, analyses security problems faced by embedded real-time system and defects of programming languages. And then put forward methods to improve the safety of embedded real-time system, providing a new security the idea for
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Embedded system security"

1

Corteggiani, Nassim. "Towards system-wide security analysis of embedded systems." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS285.

Full text
Abstract:
Cette thèse se consacre à l'amélioration des techniques d'analyse dynamiques permettant la vérification de logiciels conçus pour des systèmes embarqués, couramment appelé micrologiciel. Au vu de l'augmentation significative de la connectivité des appareils électroniques, les préoccupations concernant leur sécurité s'intensifient. Les conséquences d'une faille de sécurité sur ces appareils peuvent impliquer des répercussions économiques non négligeables et des difficultés techniques importantes pour appliquer un correctif. C’est le cas notamment des amorceurs de code qui sont généralement stock
APA, Harvard, Vancouver, ISO, and other styles
2

Rumelioglu, Sertac. "Evaluation of Embedded Firewall System." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FRumelioglu.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jiang, Ke. "Security-Driven Design of Real-Time Embedded Systems." Doctoral thesis, Linköpings universitet, Programvara och system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-123016.

Full text
Abstract:
Real-time embedded systems (RTESs) have been widely used in modern society. And it is also very common to find them in safety and security critical applications, such as transportation and medical equipment. There are, usually, several constraints imposed on a RTES, for example, timing, resource, energy, and performance, which must be satisfied simultaneously. This makes the design of such systems a difficult problem. More recently, the security of RTESs emerges as a major design concern, as more and more attacks have been reported. However, RTES security, as a parameter to be considered durin
APA, Harvard, Vancouver, ISO, and other styles
4

Abrahamsson, David. "Security Enhanced Firmware Update Procedures in Embedded Systems." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-16914.

Full text
Abstract:
<p>Many embedded systems are complex, and it is often required that the firmware in these systems are updatable by the end-user. For economical and confidentiality reasons, it is important that these systems only accept firmware approved by the firmware producer.</p><p>This thesis work focuses on creating a security enhanced firmware update procedure that is suitable for use in embedded systems. The common elements of embedded systems are described and various candidate algorithms are compared as candidates for firmware verification. Patents are used as a base for the proposal of a security en
APA, Harvard, Vancouver, ISO, and other styles
5

Kvist, Johan. "Security and Control System for fluid in a tank." Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1011.

Full text
Abstract:
<p>This rapport describes how a security and control system has been developed for moveable diesel tanks. Enormous amounts of diesel in Sweden are stolen every year and the tank that is most vulnerable is the moveable tank in other words tanks that can be moved around with diesel inside.</p><p>The report proposes methods how to measure fluid amount in a tank and how to measure if diesel is disappearing from the tank.</p><p>The report also describes a tank monitoring system prototype.</p>
APA, Harvard, Vancouver, ISO, and other styles
6

Chu, Weilian. "Evaluating effectiveness of an embedded system endpoint security technology on energy delivery systems." Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/121597.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 67-68).<br>The Internet of Things (IoT) is starting to take off in the modern day tech scene, with almost every user device being connected to a huge network with other devices; industrial energy delivery systems are no different. However, IoT in industry (known as IIoT) severely lags behind conventional IoT networks when it comes to cybersecurity, as IIoT endpoint devices generally lack th
APA, Harvard, Vancouver, ISO, and other styles
7

Vaslin, Romain. "Hardware core for off-chip memory security management in embedded system." Lorient, 2008. http://www.theses.fr/2008LORIS119.

Full text
Abstract:
Nous proposons une architecture matérielle sécurisée du démarrage du système en passant par l'exécution des applications jusqu'à sa mise àjour sur le terrain. Une nouvelle technique afin de garantir la confidentialité et l'intégrité des données en mémoires est présentée et évaluée dans un premier temp L'architecture proposée est alors étendue avec de nouvelles fonctionnalités qui permettent de gérer à la volée le niveau de sécurité spécifique à la donnée. Ceci ayant pour but de minimiser au maximum les coûts engendrés par la sécurité et notamment la surface, la performance, la consommation mém
APA, Harvard, Vancouver, ISO, and other styles
8

Deshmukh, Pallavi Prafulla. "A Hands-on Modular Laboratory Environment to Foster Learning in Control System Security." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/71755.

Full text
Abstract:
Cyber-Physical Systems (CPSes) form the core of Industrial Control Systems (ICS) and critical infrastructures. These systems use computers to control and monitor physical processes in many critical industries including aviation, industrial automation, transportation, communications, waste treatment, and power systems. Increasingly, these systems are connected with corporate networks and the Internet, making them susceptible to risks similar to traditional computing systems experiencing cyber-attacks on a conventional IT network. Furthermore, recent attacks like the Stuxnet worm have demons
APA, Harvard, Vancouver, ISO, and other styles
9

Lorden, Eric James. "A Secure Software Platform for Real-Time Embedded Systems." Thesis, Virginia Tech, 2006. http://hdl.handle.net/10919/36301.

Full text
Abstract:
Embedded systems are becoming nearly ubiquitous, found in a plurality of devices ranging from everyday cars and dishwashers to sophisticated spy satellites and remote sensing equipment. As the applications for embedded systems increase in number and diversity and continue to pervade our lives, a need arises to secure these systems. Whether the need arises from a desire to protect personal, proprietary, sensitive, or classified information, the security of the embedded system seeks to maintain the confidentiality and integrity of data contained within the system. Research into securing embed
APA, Harvard, Vancouver, ISO, and other styles
10

Skoglund, Johan. "Security of IEEE 802.11b." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1656.

Full text
Abstract:
<p>The IEEE 802.11b standard is today the only commonly used standard in Europe for fast wireless networks. This makes it possible to connect computers to networks in places where it is not possible to use wires. Examples of such situations are internet access at airports, communication in emergency areas or for military communication. Common for all these situations is that network security is important. </p><p>This thesis consists of two different parts. The first part handles the security mechanisms and the second part is an evaluation of the possibilities to use IEEE 802.11b in embedded ap
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Embedded system security"

1

Halak, Basel, ed. Machine Learning for Embedded System Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94178-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cui, Ang. Embedded System Security: A Software-based Approach. [publisher not identified], 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ред. Imbedidŭ poan unyŏng chʻeje kisul kaebal =: Embedded secure operating system technology development. Chisik Kyŏngjebu, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ред. Imbedidŭ poan unyŏng chʻeje kisul kaebal =: Embedded secure operating system technology development. Chisik Kyŏngjebu, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

International Association for Cryptologic Research. Cryptographic Hardware and Embedded Systems - CHES 2003: 5th International Workshop, Cologne, Germany, September 8-10, 2003. Proceedings. Springer Berlin Heidelberg, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

CHES 2010 (2010 Santa Barbara, Calif.). Cryptographic hardware and embedded systems-- CHES 2010: 12th international workshop, Santa Barbara, USA, August 17-20,2010 : proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pande, Amit, and Joseph Zambreno. Embedded Multimedia Security Systems. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4459-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ran, Giladi, Serpanos Dimitrios Nikolaou, and NATO Advanced Research Workshop on Security and Embedded Systems (2005 August 22-26 : Patras, Greece), eds. Security and embedded systems. IOS Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hou, Xiaolu, and Jakub Breier. Cryptography and Embedded Systems Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62205-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pande, Amit. Embedded Multimedia Security Systems: Algorithms and Architectures. Springer London, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Embedded system security"

1

Marwedel, Peter. "Embedded System Hardware." In Embedded Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60910-8_3.

Full text
Abstract:
AbstractIn this chapter, we will present the interface between the physical environment and information processing (the cyphy-interface) together with the hardware required for processing, storing, and communicating information. Due to considering CPS, covering the cyphy-interface is indispensable. The need to cover other hardware components as well is a consequence of their impact on the performance, timing characteristics, power consumption, safety, and security.
APA, Harvard, Vancouver, ISO, and other styles
2

Gebotys, Catherine H. "Side Channel Attacks on the Embedded System." In Security in Embedded Devices. Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-1530-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fovino, Igor Nai. "SCADA System Cyber Security." In Secure Smart Embedded Devices, Platforms and Applications. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7915-4_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Letitia W., Florian Lugou, and Ludovic Apvrille. "Security Modeling for Embedded System Design." In Graphical Models for Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74860-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Woo, Lai Leng, Mark Zwolinski, and Basel Halak. "Anomaly Detection in an Embedded System." In Hardware Supply Chain Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62707-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chakravarty, Saptarshi, Aman Srivastava, Amrita Biswas, Kathyaini Rao, and Gargee Phukan. "Embedded Automobile Based Vehicular Security System." In Advances in Communication, Devices and Networking. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4932-8_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Habibi, Javid, Ajay Panicker, Aditi Gupta, and Elisa Bertino. "DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices." In Network and System Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jingjing, Ma. "Analysis of Embedded Real-Time System Security." In Advances in Computer Science, Environment, Ecoinformatics, and Education. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23324-1_69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

González González, Oscar Arturo, Alina Mariana Pérez Soberanes, Víctor Hugo García Ortega, and Julio César Sosa Savedra. "Embedded Human Detection System for Home Security." In Communications in Computer and Information Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62554-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lim, Jae-Deok, Sung-Kyong Un, Jeong-Nyeo Kim, and ChoelHoon Lee. "Implementation of LSM-Based RBAC Module for Embedded System." In Information Security Applications. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77535-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Embedded system security"

1

Diwaker, Sanjai K., Pawan Kumar Chaurasia, and Mazhar Khaliq. "Pathways for Security of Embedded System: Issues and Challenges." In 2024 Second International Conference Computational and Characterization Techniques in Engineering & Sciences (IC3TES). IEEE, 2024. https://doi.org/10.1109/ic3tes62412.2024.10877516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pun, Kwok Ho, Yiu Sang Moon, Chi Chiu Tsang, Chun Tak Chow, and Siu Man Chan. "A face recognition embedded system." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2005. http://dx.doi.org/10.1117/12.603566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Qingyu, Ou, Luo Fang, and Huang Kai. "High-Security System Primitive for Embedded Systems." In 2009 International Conference on Multimedia Information Networking and Security. IEEE, 2009. http://dx.doi.org/10.1109/mines.2009.48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Gen, Jianmin Zhang, Minghua Niu, and Yong Li. "Warehouse Security System based on Embedded System." In International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015). Atlantis Press, 2015. http://dx.doi.org/10.2991/lemcs-15.2015.245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhao, Guangyuan, Zhiwei Wang, Wei Li, and Ke Wang. "An Embedded Laboratory Security Monitoring System." In 2011 International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). IEEE, 2011. http://dx.doi.org/10.1109/icmtma.2011.100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Louk, Maya, Hyotaek Lim, and Hoon Jae Lee. "Security System in Cloud Computing for Medical Data Usage." In Embedded Ubiquitous 2013. Science & Engineering Research Support soCiety, 2013. http://dx.doi.org/10.14257/astl.2013.38.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xie, WeiHua, Jie Tian, Xin Yang, Hong Chen, Yuliang He, and TangHui Zhang. "Embedded fingerprint identification system based on DSP." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2005. http://dx.doi.org/10.1117/12.603234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Falk, Heiko. "Session details: Security in memory." In ESWEEK'12: Eighth Embedded System Week. ACM, 2012. http://dx.doi.org/10.1145/3250258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gogniat, G., T. Wolf, and W. Burleson. "Reconfigurable Security Primitive for Embedded Systems." In 2005 International Symposium on System-on-Chip. IEEE, 2005. http://dx.doi.org/10.1109/issoc.2005.1595635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baxter, Christopher R., Todd R. Cicchi, Mark A. Massie, and Paul L. McCarley. "Miniature embedded real-time image processor system for smart sensor systems." In Defense and Security, edited by Bjorn F. Andresen and Gabor F. Fulop. SPIE, 2004. http://dx.doi.org/10.1117/12.548406.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Embedded system security"

1

Ganger, Gregory R. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices). Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada465393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ganger, Gregory R., and David F. Nagle. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada396954.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Reinhart, Tod, Carolyn Boettcher, G. A. Gandara, and Mark Hama. Defining a Security Architecture for Real-Time Embedded Systems. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada465687.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sonmez Turan, Meltem. Ascon-Based Lightweight Cryptography Standards for Constrained Devices. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.800-232.

Full text
Abstract:
In 2023, the National Institute of Standards and Technology (NIST) announced the selection of the Ascon family of algorithms designed by Dobraunig, Eichlseder, Mendel, and Schläffer to provide efficient cryptographic solutions for resource-constrained devices. This decision emerged from a rigorous, multi-round lightweight cryptography standardization process. The Ascon family includes a suite of cryptographic primitives that provide Authenticated Encryption with Associated Data (AEAD), hash function, and eXtendable Output Function (XOF) capabilities. The Ascon family is characterized by lightw
APA, Harvard, Vancouver, ISO, and other styles
5

Shah, Tavseef Mairaj, Olivia Riemer, Nadia El-Hage Scialabba, and Alexander Müller. The Agri-Food Systems Transformation Protocol: Mapping the Agents and Drivers of Transformation. TMG Research gGmbH, 2023. http://dx.doi.org/10.35435/1.2023.4.

Full text
Abstract:
There is a broad consensus that agri-food systems need to be transformed to address the mounting global challenges including food and nutrition security, environmental degradation, and socioeconomic inequities. However, agreement is lacking on what is needed to drive this transformation. This report builds on a sustainability analysis of different proposed pathways and approaches to address transformative needs. It also serves as a study of the drivers and agents that support the implementation of these proposed pathways in different cases around the globe. We recommend the adoption of a multi
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!