This chapter will provide an overview to all these security requirements, applying them to different platforms used to implement embedded hardware. In order to provide a better understanding, Section 15.2 will cover a taxonomy of the technologies used to develop embedded systems. Then the security requirements and their mechanisms will be covered in Section 15.3 in order to provide the basis for the explanation of how to implement such security mechanisms discussed in Section 15.4, finishing with conclusion and future trends.
Information security algorithm on embedded hardware, Page 1 of 2
< Previous page Next page > /docserver/preview/fulltext/books/sc/pbse001e/PBSE001E_ch15-1.gif /docserver/preview/fulltext/books/sc/pbse001e/PBSE001E_ch15-2.gif