{"title":"嵌入式系统中SSL的实现策略","authors":"Qianqian Ge, Feng Chen","doi":"10.1109/FBIE.2008.81","DOIUrl":null,"url":null,"abstract":"With the hackers' attacks changing from the desktop to embedded applications, hardware and software security decision leads the whole design of the embedded systems. This paper describes from the characteristics of SSL protocol, concludes two aspects from external hardware cooperation and internal structure optimizations. It presents the strategies of implementing SSL protocol on both software and hardware design.","PeriodicalId":415908,"journal":{"name":"2008 International Seminar on Future BioMedical Information Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Strategies for Implementing SSL on Embedded System\",\"authors\":\"Qianqian Ge, Feng Chen\",\"doi\":\"10.1109/FBIE.2008.81\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the hackers' attacks changing from the desktop to embedded applications, hardware and software security decision leads the whole design of the embedded systems. This paper describes from the characteristics of SSL protocol, concludes two aspects from external hardware cooperation and internal structure optimizations. It presents the strategies of implementing SSL protocol on both software and hardware design.\",\"PeriodicalId\":415908,\"journal\":{\"name\":\"2008 International Seminar on Future BioMedical Information Engineering\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Seminar on Future BioMedical Information Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FBIE.2008.81\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Seminar on Future BioMedical Information Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FBIE.2008.81","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Strategies for Implementing SSL on Embedded System
With the hackers' attacks changing from the desktop to embedded applications, hardware and software security decision leads the whole design of the embedded systems. This paper describes from the characteristics of SSL protocol, concludes two aspects from external hardware cooperation and internal structure optimizations. It presents the strategies of implementing SSL protocol on both software and hardware design.