性别 发表于 2025-3-27 00:59:28

Analysis of Potential Vulnerabilities in Payment Terminals procedures has undoubtedly reduced criminals’ profit, and significantly hardened their work. Still though, all payment systems’ components are constantly scrutinised to identify vulnerabilities. This chapter focuses on the security of payment terminals, as a critical component in a payment system’s

Relinquish 发表于 2025-3-27 02:07:43

Near Field CommunicationC, a key technology is on its way into the consumer’s most personal device, allowing the customer to use his devices for secure services such as payment or ticketing but also for service initiation or data exchange. Interoperability is one of the most important goals to be achieved prior to the roll

Harass 发表于 2025-3-27 09:18:37

The BIOS and Rootkitsmentation and software for protecting lower levels subsystems such as the Basic Input Output System (BIOS). Security professionals are well aware that the security on any system is as strong as its weakest link as an attacker will seek to break into a system with the least amount of effort. In this

水槽 发表于 2025-3-27 12:23:34

d industry experts and applicable to real-world problems.Use.New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded secu

繁重 发表于 2025-3-27 16:25:35

An Introduction to Smart Cards and RFIDsspecially with developments in the mobile phone area. This chapter will consider a range of smart cards and RFIDs, and associated applications. It will also briefly cover the traditional manufacture, personalisation and management aspects, illustrating how they are challenged by new mobile developments.

Inflated 发表于 2025-3-27 20:35:57

http://reply.papertrans.cn/87/8634/863321/863321_36.png

MELON 发表于 2025-3-28 00:10:35

http://reply.papertrans.cn/87/8634/863321/863321_37.png

嬉耍 发表于 2025-3-28 03:43:26

Security of Embedded Location Systemssed, along with proposals for securely verifying physical location estimates. Finally, the security aspects of global navigation space systems (GNSS) used for location information in embedded applications are briefly discussed.

sebaceous-gland 发表于 2025-3-28 08:22:27

http://reply.papertrans.cn/87/8634/863321/863321_39.png

圆桶 发表于 2025-3-28 11:26:33

Book 2014ult they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. .Secure Smart Embedded Devices, Platforms and Applications. provides a broad overview of the many security and practical issues of embedded devices
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Secure Smart Embedded Devices, Platforms and Applications; Konstantinos Markantonakis,Keith Mayes Book 2014 Springer Science+Business Medi