{"title":"An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families","authors":"T. Ashur, Atul Luykx","doi":"10.1007/978-3-030-10591-4_4","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_4","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126701844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Solanas, Edgar Batista, Fran Casino, Achilleas Papageorgiou, C. Patsakis
{"title":"Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach","authors":"A. Solanas, Edgar Batista, Fran Casino, Achilleas Papageorgiou, C. Patsakis","doi":"10.1007/978-3-030-10591-4_12","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_12","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121241498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gildas Avoine, Ioana Boureanu, David Gérault, G. Hancke, P. Lafourcade, Cristina Onete
{"title":"From Relay Attacks to Distance-Bounding Protocols","authors":"Gildas Avoine, Ioana Boureanu, David Gérault, G. Hancke, P. Lafourcade, Cristina Onete","doi":"10.1007/978-3-030-10591-4_7","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_7","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130087169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Mileva, V. Dimitrova, Orhun Kara, M. Mihaljević
{"title":"Catalog and Illustrative Examples of Lightweight Cryptographic Primitives","authors":"A. Mileva, V. Dimitrova, Orhun Kara, M. Mihaljević","doi":"10.1007/978-3-030-10591-4_2","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_2","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"340 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133930092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emerging Security Challenges for Ubiquitous Devices","authors":"Mirosław Kutyłowski, P. Syga, M. Yung","doi":"10.1007/978-3-030-10591-4_1","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_1","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132929521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Batina, Milena Djukanovic, Annelie Heuser, S. Picek
{"title":"It Started with Templates: The Future of Profiling in Side-Channel Analysis","authors":"L. Batina, Milena Djukanovic, Annelie Heuser, S. Picek","doi":"10.1007/978-3-030-10591-4_8","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_8","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127294195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding Software Bugs in Embedded Devices","authors":"Aurélien Francillon, Sam L. Thomas, Andrei Costin","doi":"10.1007/978-3-030-10591-4_11","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_11","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123129692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators","authors":"D. Hurley-Smith, J. Hernandez-Castro","doi":"10.1007/978-3-030-10591-4_10","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_10","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129698754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ultra-lightweight Authentication","authors":"Xavier Carpent, P. D’Arco, R. Prisco","doi":"10.1007/978-3-030-10591-4_6","DOIUrl":"https://doi.org/10.1007/978-3-030-10591-4_6","url":null,"abstract":"","PeriodicalId":133887,"journal":{"name":"Security of Ubiquitous Computing Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133431110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}