The online version of the original book can be found under DOI 10.1007/978-1-4614-7915-4
You have full access to this open access chapter, Download chapter PDF
Keywords
- Supervisory Control And Data Acquisition (SCADA)
- Acorn RISC Machine
- Field Programmable Gate Array (FPGA)
- Near Field Communication (NFC)
- Radio Frequency Identity (RFID)
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Errata to: K. Markantonakis and K. Mayes (eds.), Secure Smart Embedded Devices, Platforms and Applications, DOI 10.1007/978-1-4614-7915-4
-
Page vii, Foreword, Paragraph 3 Line 2: RFID NFC should read "Radio Frequency Identity (RFID), Near Field Communication (NFC)"
-
Page x, Preface, Paragraph 2 Line 10: FPGA should read "Field Programmable Gate Array (FPGA)"
-
Page x, Preface, Paragraph 3 Line 16: WSN should read "Wireless Sensor Nodes (WSN)"
-
Page xi, Preface, Paragraph 1 Line 11: SCADA should read "Supervisory Control And Data Acquisition (SCADA)"
-
Page xv, Acknowledgements, Paragraph 1 Line 8: Naem should read “Naeem”
-
Page xxxviii, Contributors, Paragraph 4 Line 7: Saarbrcken should be "Saarbrucken"
-
Page 55, Section 3.3.1, Paragraph 1 Line 7: Acorn RISC machine should read "Advanced Risk Machine"
-
Page 100, Section 5.3, Paragraph 2 Lines 7 and 12: GE should read "Gate Equivalent (GE)"
-
Page 134, Table 6.1, Heading: unit should be "μs" not "us"
Capitalization of acronyms was incorrect in the published volume. The corrected list of acronyms is provided below:
Page | Section | Para | Expansion (Abbreviation) | Correct form |
---|---|---|---|---|
3 | Abstract | Radio Frequency Identification (RFID) | radio frequency identification (RFID) | |
3 | 1 | 1 | Radio Frequency Identity (RFID) | radio frequency identity (RFID) |
4 | 1, list 1 | 1 | Identification Friend or Foe (IFF) | identification friend or foe (IFF) |
5 | 1.2.1 | 4 | Subscriber Identity Module (SIM) | subscriber identity module (SIM) |
5 | 1.2.1 | 4 | Universal Integrated Circuit Card (UICC) | universal integrated circuit card (UICC) |
6 | 1.2.1 | 3 | Identities (IDs) | identities (IDs) |
7 | 1.2.2 | 1 | Automatic Teller Machines (ATM) | automatic teller machines (ATM) |
7 | 1.2.2 | 1 | Point of Sale terminals (POS) | point of sale terminals (POS) |
7 | 1.2.2, list 5 | 1 | Personal Identification Numbers (PIN codes) | personal identification numbers (PIN codes) |
9 | 1.2.4 | 1 | Set Top Boxes (STB) | set top boxes (STB) |
12 | 1.2.7 | 1 | High Medium or Low (H:M:L) | high medium or low (H:M:L) |
13 | 1.3.1 | 2 | Security Element (SE) | security element (SE) |
13 | 1.3.1 | 2 | Near Field Communication (NFC) | near field communication (NFC) |
15 | 1.3.2 | 4 | Application protocol Data Unit (APDU) | application protocol data unit (APDU) |
17 | 1.4.2 | 1 | Message Authentication Code (MAC) | message authentication code (MAC) |
17 | 1.4.2 | 1 | Key Management System (KMS) | key management system (KMS) |
20 | 1.6 | 1 | Near Field Communication (NFC) | near field communication (NFC) |
21 | 1.7 | 2 | Read Only Memory (ROM) | read only memory (ROM) |
21 | 1.7 | 2 | Operating System (OS) | operating system (OS) |
23 | 1.7 | 5 | Trusted Service Manager (TSM) | trusted service manager (TSM) |
31 | Table 2.1 | 2-D Discrete cosine transform (DCT) | 2-D discrete cosine transform (DCT) | |
38 | 2.3.1, list 2 | 2 | Level 1 (L1) | level 1 (L1) |
38 | 2.3.1, list 2 | 2 | Level 2 (L2) | level 2 (L2) |
38 | 2.3.1, list 2 | 2 | Level 3 (L3) | level 3 (L3) |
40 | 2.3.2 | 2 | Instruction set architecture (ISA) | instruction set architecture (ISA) |
41 | 2.3.2 | 7 | Advanced RISC Machine (ARM) | advanced RISC machine (ARM) |
46 | 2.3.4, list 3 | 3 | Voice-over-IP (VoIP) | voice-over-IP (VoIP) |
49 | Abstract | 1 | Central Processing Units (CPU) | central processing units (CPU) |
50 | 3.1 | 3 | Joint Test Action Group (JTAG) | joint test action group (JTAG) |
51 | 3.2 | 1 | Very Long Instruction Word (VLIW) | very long Instruction Word (VLIW) |
51 | 3.2 | 1 | Digital Signal Processors (DSPs) | digital signal processors (DSPs) |
51 | 3.2 | 3 | Integrated Circuit (IC) | integrated circuit (IC) |
51 | 3.2 | 3 | Bit Slice Processors (BSP) | bit slice processors (BSP) |
51 | 3.2 | 3 | Programmable Read Only Memories (PROM) | programmable read only memories (PROM) |
51 | 3.2 | 3 | Digital Signal Processor (DSP) | digital signal processor (DSP) |
52 | 3.3 | 4 | Integrated Circuit (IC) | integrated circuit (IC) |
53 | 3.3 | 1 | Complementary Metal Oxide Semiconductor (CMOS) | complementary metal oxide semiconductor (CMOS) |
54 | 3.3.2 | 1 | Field Programmable Gate Array (FPGA) | field programmable gate array (FPGA) |
55 | 3.3.3 | 1 | Acorn RISC Machine (ARM) | acorn RISC machine (ARM) |
55 | 3.3.3 | 1 | Differential Power Analysis (DPA) | differential power analysis (DPA) |
56 | 3.4 | 2 | Serial Peripheral Bus (SPI) | serial peripheral bus (SPI) |
56 | 3.4 | 2 | Control Area Network (CAN) | control area network (CAN) |
56 | 3.4 | 2 | Universal Serial Bus (USB) | universal serial bus (USB) |
57 | 3.4 | 2 | Application-Specific Integrated Circuits (ASICs) | application-specific integrated circuits (ASICs) |
58 | 3.4 | 1 | Electrically Erasable Programmable Read Only Memory (EEPROM) | electrically erasable programmable read only memory (EEPROM) |
58 | 3.4 | 2 | Peripheral Interface Controller (PIC) | peripheral interface controller (PIC) |
59 | 3.4 | 1 | One Time-Programmable (OTP) | one time-programmable (OTP) |
61 | 3.4.1 | 1 | Static Random Access Memory (SRAM) | static random access memory (SRAM) |
61 | 3.4.1 | 1 | Read Only Memory (ROM) | read only memory (ROM) |
62 | 3.4.1 | 2 | One-Time Programming (OTP) | one-time programming (OTP) |
62 | 3.4.1 | 3 | Electrically Erasable PROM (EEPROM) | electrically erasable PROM (EEPROM) |
65 | 3.4.2 | 2 | In-Circuit-Emulator (ICE) | in-circuit-emulator (ICE) |
67 | 3.5 | 1 | Differential Electromagnetic Analysis (DEMA) | differential electromagnetic analysis (DEMA) |
68 | 3.6 | 1 | Trusted Platform Modules (TPM) | trusted platform modules (TPM) |
72 | 4.1 | 1 | Trusted Computing Group (TCG) | trusted computing group (TCG) |
72 | 4.1 | 1 | Trusted Multi-tenant Infrastructure and trusted network connect | trusted multi-tenant infrastructure and trusted network connect |
76 | 4.3.1 | 4 | TPM Entity (TPME) | TPM entity (TPME) |
77 | 4.3.2 | Table 4.1 | Platform Configuration Registers (PCRs) | platform configuration registers (PCRs) |
81 | 4.3.4.2 | 2 | Initial Program Loader: IPL | initial program loader: IPL |
108 | 5.5 | 4 | Reduced Instruction Set Computing (RISC) | reduced instruction set computing (RISC) |
125 | 6.3.1 | 2 | Data Encryption Standard (DES) | data encryption standard (DES) |
128 | 6.3.1.3 | 6 | Advanced Encryption Standard (AES) | advanced encryption standard (AES) |
129 | 6.3.1.4 | 4 | Cipher Block Chaining (CBC) | cipher block chaining (CBC) |
131 | 6.3.1.5 | 1 | Cyclic Redundancy Check (CRC) | cyclic redundancy check (CRC) |
134 | 6.3.2 | 1 | Optimal Asymmetric Encryption Padding (OAEP) | optimal asymmetric encryption padding (OAEP) |
134 | 6.3.3 | 2 | Cyclic Redundancy Check (CRC) | Cyclic redundancy check (CRC) |
135 | 6.3.3 | 1 | Message Authentication Code (MAC) | Message authentication code (MAC) |
136 | 6.4.1 | 5 | Public Key Infrastructure (PKI) | public key infrastructure (PKI) |
136 | 6.4.1 | 6 | Certification Authority (CA) | certification authority (CA) |
137 | 6.4.1 | 1 | Registration Authority (RA) | registration authority (RA) |
137 | 6.4.1 | 1 | Point of Sale (POS) | point of sale (POS) |
137 | 6.4.1 | 2 | Certificate Revocation List (CRL) | certificate revocation list (CRL) |
137 | 6.4.2 | 4 | Near Field Communication (NFC) | near field communication (NFC) |
139 | 6.5 | 1 | Security Elements (SE) | security elements (SE) |
147 | 7.2 | 4 | Data Encryption Standard (DES) | data encryption standard (DES) |
147 | 7.2.1 | 5 | Advanced Encryption Standard (AES) | advanced encryption standard (AES) |
148 | 7.2.1 | 2 | Permuted Choice 1 (PC1) | permuted choice 1 (PC1) |
148 | 7.2.1 | 2 | Permuted Choice 2 (PC2) | permuted choice 2 (PC2) |
168 | 7.5.3.1 | 5 | Chinese Remainder Theorem (CRT) | Chinese remainder theorem (CRT) |
179 | Chapter 8 | 2 | Graphics Processing Units (GPUs) | Graphics processing units (GPUs) |
8.1.1 | 4 | Compute Unified Device Architecture (CUDA) | compute unified device achitecture (CUDA) | |
8.1.3 | 1 | Close-to-Metal (CTM) | close-to-metal (CTM) | |
8.2.1 | 3 | Data Encryption Standard (DES) | data encryption standard (DES) | |
212 | 9.2.3 | 1 | Side-channel Attack Standard Evaluation BOard (SASEBO) | Side-Channel Attack Standard Evaluation Board (SASEBO) |
218 | 9.3.2.4 | 4 | PROM (Programmable Read-Only Memory) | PROM (programmable read-only memory) |
227 | 10 (Abstract) | 1 | Global System for Mobile Communications (GSM) | global system for mobile communications (GSM) |
227 | 10 (Abstract) | 1 | Universal Mobile Telecommunications System (UMTS) | Universal mobile telecommunications system (UMTS) |
227 | 10 (Abstract) | 1 | Subscriber Identity Module (SIM) | subscriber identity module (SIM) |
228 | 10.1 | 1 | Near Field Communication (NFC) | near field communication (NFC) |
228 | 10.1 | 2 | Subscriber Identity Module (SIM) | subscriber identity module (SIM) |
229 | 10.1 | 1 | Mobile Equipment (ME) | mobile equipment (ME) |
229 | 10.2 | 2 | Total Access Communications (TACS) | total access communications (TACS) |
230 | 10.2.1 | 2 | Authentication Centre (AuC) | authentication centre (AuC) |
230 | 10.2.1 | 3 | International Mobile Subscriber Identity—IMSI | international mobile subscriber identity—IMSI |
230 | 10.2.1 | 3 | Secret Key (Ki) | secret key (Ki) |
230 | 10.2.1 | 4 | secret key (Ki) | secret key (Ki) |
230 | 10.2.1 | 4 | session key (Kc) | session key (Kc) |
232 | 10.2.1 | 1 | IntegrityKey (IK) | integritykey (IK) |
234 | 10.3.2 | 6 | Mobile Equipment (ME) | mobile equipment (ME) |
238 | 10.4.2 | 1 | Over The Air (OTA) | over the air (OTA) |
240 | 10.4.7 | 5 | Near Field Communication (NFC) | near field communication (NFC) |
240 | 10.4.7 | 5 | Security Element (SE) | security element (SE) |
243 | 10.5.2 | 3 | Focussed Ion Beam (FIB) | focussed ion beam (FIB) |
246 | 10.5.4 | 2 | Chinese Remainder Theorem (CRT) | Chinese remainder theorem (CRT) |
247 | 10.6.1 | 2 | Pure Software SIM (PSSIM) | pure software SIM (PSSIM) |
247 | 10.6.1.1 | 3 | Telemetry/Machine-to-Machine (T/M2M) | telemetry/machine-to-machine (T/M2M) |
249 | 10.6.2 | Hardware Shared Security Software SIM Solution (HS-SSIM) | hardware shared security software SIM solution (HS-SSIM) | |
249 | 10.6.2 | 2 | Advanced RISC Machines Limited (ARM) | advanced RISC machines limited (ARM) |
249 | 10.6.2 | 6 | Data Rights Management (DRM) | data rights management (DRM) |
250 | 10.6.2 | 3 | Small Terminal Interoperability Platform (STIP) | small terminal interoperability platform (STIP) |
251 | 10.6.3 | 4 | Standalone Hardware Security SIM (SH-SIM) | standalone hardware security SIM (SH-SIM) |
252 | 10.6.3.2 | 3 | Electrically Erasable Programmable Read-Only Memory (EEPROM) | electrically erasable Programmable Read-Only Memory (EEPROM) |
252 | 10.6.3.2 | 3 | Hardware Security Module (HSM) | hardware security module (HSM) |
254 | 10.7 | 2 | Trusted Platform Module (TPM) | trusted platform module (TPM) |
254 | 10.7 | 2 | Trusted Computing Platform Alliance (TCPA) | trusted computing platform alliance (TCPA) |
254 | 10.7 | 2 | Trusted Computing Group (TCG) | trusted computing group (TCG) |
255 | 10.7.1 | 5 | Root of Trust for Measurement (RTM) | Root of trust for measurement (RTM) |
255 | 10.7.1 | 5 | Root of Trust for Storage (RTS) | Root of trust for storage (RTS) |
255 | 10.7.1 | 5 | Root of Trust for Reporting (RTR) | Root of trust for reporting (RTR) |
255 | 10.7.1 | 6 | Core Root of Trust for Measurement’ (CRTM)) | core root of trust for measurement (CRTM) |
255 | 10.7.1 | 6 | BIOS Boot Block (BBB) | BIOS boot block (BBB) |
255 | 10.7.1 | 6 | Platform Configuration Registers (PCRs) | platform configuration registers (PCRs) |
256 | 10.7.2 | 1 | Platform Configuration Registers (PCRs) | platform configuration registers (PCRs) |
257 | 10.7.3 | 2 | Mobile Trusted Platform (MTM) | mobile trusted Platform (MTP) |
257 | 10.7.4 | Section title | Mobile Trusted Platform (MTP) | Mobile trusted platform (MTP) |
258 | 10.7.4 | 1 | Mobile Local-Owner Trusted Module (MLTM) | mobile local-owner trusted module (MLTM) |
258 | 10.7.4 | 1 | Mobile Remote-Owner Trusted Module (MRTM) | mobile remote-owner trusted module (MRTM) |
258 | 10.7.4 | 3 | Protection Profile (PP) | protection profile (PP) |
261 | 10.8 | 1 | Pure Software SIM (PSSIM) | pure software SIM (PSSIM) |
261 | 10.8 | 2 | Hardware Shared Software SIM (HS-SSIM) | hardware shared software SIM (HS-SSIM) |
264 | 10.8.1 | 2 | Security Element (SE) | security element (SE) |
268 | 11.2 | 4 | Real-Rime Locating System (RTLS) | real-time locating system (RTLS) |
275 | 11.3.1.1 | 1 | Angle of Arrival (AoA) | Angle of arrival (AoA) |
276 | 11.3.1.3 | 2 | Time of arrival (ToA) | time of arrival (ToA) |
276 | 11.3.1.3 | 2 | Time difference of arrival (TDoA) | time difference of arrival (TDoA) |
276 | 11.3.1.3 | 2 | Round trip time (RTT) | round trip time (RTT) |
278 | 11.4 | 2 | Round-trip-time (RTT) | round-trip-time (RTT) |
279 | 11.4 | 1 | Ultra-WideBand (UWB) | ultra-wideBand (UWB) |
287 | 12.1 | 2 | Electronic control units (ECU) | electronic control units (ECU) |
287 | 12.1 | 2 | Controller Area Network (CAN) | controller area network (CAN) |
288 | 12.1 | Local interconnect network (LIN) | local interconnect network (LIN) | |
288 | 12.1 | 2 | Dedicated short range communication (DSRC) | dedicated short range communication (DSRC) |
288 | 12.1 | 2 | Vehicle-to-Vehicles communication - V2V | vehicle-to-vehicles communication - V2V |
288 | 12.1 | 2 | Vehicle-to-Infrastructure communication =- V2I | vehicle-to-Infrastructure communication =- V2I |
288 | 12.1 | 2 | Universal Mobile Telecommunications System (UMTS) | Universal Mobile Telecommunications System (UMTS) |
288 | 12.1 | 2 | Global Positioning System (GPS) | Global positioning system (GPS) |
295 | 12.2.2.2 | 6 | Radio Data System (RDS) | radio data system (RDS) |
295 | 12.2.2.2 | 6 | Global Positioning System (GPS) | global positioning system (GPS) |
296 | 12.2.4 | 3 | Anti-lock braking system (ABS) | anti-lock braking system (ABS) |
296 | 12.2.4 | 3 | Electronic stability program (ESP) | electronic stability program (ESP) |
298 | 12.2.6 | 6 | Original Equipment Manufacturer (OEM) | original equipment manufacturer (OEM) |
299 | 12.2.8 | 7 | Engine control unit (ECU) | engine control unit (ECU) |
300 | 12.2.8 | 1 | Center for Automotive embedded systems security (CAESS) | Center for Automotive Embedded Systems Security (CAESS) |
300 | 12.2.8 | 1 | Tyre pressure monitoring system (TPMS) | tyre pressure monitoring system (TPMS) |
302 | 12.3 | 3 | Open vehicular secure platform (OVERSEE) | open vehicular secure platform (OVERSEE) |
302 | 12.3 | 3 | Electronic Control Unit (ECU) | electronic control unit (ECU) |
303 | 12.3.1 | 2 | Operating System (OS) | operating system (OS) |
303 | 12.3.1 | 2 | Real Time Operating System (RTOS) | real time operating system (RTOS) |
303 | 12.3.1 | 3 | Electronic code unit (ECU) | electronic code unit (ECU) |
306 | 12.3.2 | 3 | Lightweight directory access protocol (LDAP) | lightweight directory access protocol (LDAP) |
306 | 12.3.2 | 3 | NSS (Name Switch Service) | NSS (name switch service) |
306 | 12.3.2 | 3 | PAMs (Pluggable Authentication Modules) | PAMs (pluggable authentication modules) |
307 | 12.3.3 | 1 | Electrically Erasable Programmable Read-Only Memory (EEPROM) | electrically erasable programmable read-only memory (EEPROM) |
307 | 12.3.3 | 2 | Protection Profiles (PP) | protection profiles (PP) |
307 | 12.3.3 | 8 | Secure Hardware Extension (SHE) | secure hardware extension (SHE) |
308 | 12.3.3 | 1 | E-safety Vehicle Intrusion Protected Applications (EVITA) | E-safety vehicle intrusion protected applications (EVITA) |
336 | 14.2 | 2 | national oceanographic and atmospheric administration (NOAA) | National Oceanographic and Atmospheric Administration (NOAA) |
336 | 14.2 | 2 | defense advanced research projects agency (DARPA) | Defense Advanced Research Projects Agency (DARPA) |
340 | 14.4 | 1 | Inter-Integrated Circuit (I2C) | inter-integrated circuit (I2C) |
345 | 14.5.2.1 | 2 | Denial-of-Service (DoS) | denial-of-service (DoS) |
345 | 14.5.2.1 | 4 | Frequency-Hopping Spread Spectrum (FHSS) | frequency-hopping spread spectrum (FHSS) |
357 | 15.3.2 | 3 | Universal Integrated Circuit Card (UICC) | universal integrated circuit card (UICC) |
357 | 15.3.2 | 4 | SigIn-SigOut-Communication (S2C) | SigIn-SigOut-communication (S2C) |
359 | 15.4 | 6 | Portable Operating System Interface (POSIX) | Portable operating system interface (POSIX) |
362 | 15.5.3 | 3 | GSM association (GSMA | GSM Association (GSMA) |
362 | 15.5.3 | 4 | Digital Rights Management (DRM) | digital rights management (DRM) |
364 | 15.6.1 | 4 | Japanese industrial standard (JIS) | Japanese Industrial Standard (JIS) |
364 | 15.6.2 | NFC Data Exchange Format (NDEF) | NFC data exchange format (NDEF) | |
365 | 15.6.2 | 1 | Multipurpose Internet Mail Extensions (MIME) | multipurpose internet mail extensions (MIME) |
369 | Abstract | 1 | Basic Input Output System (BIOS) | basic input output system (BIOS) |
369 | Abstract | 1 | Trusted Platform Module (TPM) | trusted platform module (TPM) |
370 | 16.1.1 | 1 | Random Access Memory (RAM) | random access memory (RAM) |
370 | 16.1.1 | 2 | Operating System (OS) | operating system (OS) |
370 | 16.1.1 | 3 | User Interface (UI) | user interface (UI) |
383 | 17 (Abstract) | 1 | Hardware Security Modules (HSMs) | Hardware security modules (HSMs) |
383 | 17 (Abstract) | 1 | Tamper Resistant Security Modules (TRSMs) | tamper resistant security modules (TRSMs) |
383 | 17 (Abstract) | 1 | Personal Identification Numbers (PINs) | personal identification numbers (PINs) |
383 | 17 (Abstract) | 1 | Federal Information Processing Standard (FIPS) | federal information processing standard (FIPS) |
383 | 17.1 | 2 | Hardware Security Module (HSM) | hardware security module (HSM) |
384 | 17.1 | 1 | Tamper Resistant Security Modules (TRSM) | tamper resistant security modules (TRSM) |
384 | 17.1 | 1 | Secure Cryptographic Devices (SCD) | secure cryptographic devices (SCD) |
384 | 17.1 | 1 | Certification Authority (CA) | certification authority (CA) |
384 | 17.1 | 1 | Point of Sales terminals (POS terminals) | point of sales terminals (POS terminals) |
384 | 17.2 | 3 | Payment card industry (PCI) | payment card industry (PCI) |
385 | 17.2 | 2 | Card Verification Value (CVV) | card verification value (CVV) |
385 | 17.2 | 2 | Card Verification Key (CVK) | card verification key (CVK) |
385 | 17.2 | 2 | Personal Identification Number (PIN) | personal identification number (PIN) |
385 | 17.2 | 3 | PIN Verification Key (PNK) | PIN verification key (PNK) |
385 | 17.2 | 4 | Automatic Teller Machine (ATM) | automatic teller machine (ATM) |
386 | 17.2 | 4 | Message Authentication Code (MAC) | message authentication Code (MAC) |
388 | 17.3 | 3 | Host Master Key (HMK) | host master key (HMK) |
390 | 17.4 | 1 | Federal Information Processing Standard (FIPS) | federal information processing standard (FIPS) |
392 | 17.4 | Table 17.2 | Code of Federal Regulations (CFR) | Code of federal regulations (CFR) |
395 | 17.5 | 3 | PIN Entry Device (PED) | PIN entry device (PED) |
396 | 17.6 | 1 | Key Encrypting Key (KEK) | key encrypting key (KEK) |
397 | 17.6 | 4 | Electronic Codebook (ECB) | electronic codebook (ECB) |
398 | 17.6 | 4 | Cipher Block Chaining (CBC) | cipher block chaining (CBC) |
398 | 17.6 | 4 | Initial Vector (IV) | initial vector (IV) |
401 | 17.7 | 4 | Account Related Data (ARD) | account related data (ARD) |
410 | 18.2 | 3 | Protection Profile (PP) | protection profile (PP) |
413 | 18.2.1 | 2 | (PIN Transaction Security) PTS | (PIN transaction security) PTS |
413 | 18.2.2 | 4 | information technology Security Evaluation Facility (ITSEF) | information technology security evaluation facility (ITSEF) |
413 | 18.2.2 | 4 | CommerciaL Evaluation Facility (CLEF) | commerciaL evaluation facility (CLEF) |
414 | 18.2.2 | 3 | common criteria management committee (CCMC) | Common Criteria Management Committee (CCMC) |
414 | 18.2.2 | 3 | common criteria development board (CCDB) | Common Criteria Development Board (CCDB) |
415 | 18.2.3 | 4 | Common Evaluation Methodology (CEM) | common evaluation methodology (CEM) |
421 | 18.4.1 | 3 | Derived Test Requirements (DTRs) | derived test requirements (DTRs) |
433 | 19.2.2.2 | 2 | Static Random Access Memory (SRAM) | static random access memory (SRAM) |
452 | 20.2 | 2 | Programmable Logic Controller (PLC) | programmable logic controller (PLC) |
452 | 20.2 | 2 | Remote Terminal Units (RTU) | remote terminal units (RTU) |
453 | 20.2 | 3 | Human Machine Interface (HMI) | Human machine interface (HMI) |
453 | 20.2 | 4 | Application programming interface (API) | application programming interface (API) |
457 | 20.3.2 | 5 | American petroleum institute (API) | American Petroleum Institute (API) |
458 | 20.3.2 | 6 | electric reliability organisation (ERO) | Electric Reliability Organisation (ERO) |
464 | 20.4.3 | 3 | Network Intrusion Detection System (NIDS) | network intrusion detection system (NIDS) |
475 | 21.1 | 1 | Central Processing Unit (CPU) | central processing unit (CPU) |
477 | 21.3.1 | 1 | Peripheral Interface Controller (PIC) | Peripheral interface controller (PIC) |
477 | 21.3.1 | 1 | Microprocessor unit (MPU) | microprocessor unit (MPU) |
479 | 21.3.4 | 1 | Integrated Development Environment (IDE) | integrated development environment (IDE) |
481 | 21.4.1 | 1 | National Institute of Standards and Technology (NIST) | National Institute of Standards and Technology (NIST) |
498 | 22.2.1 | 1 | Java Card virtual machine (JCVM) | Java card virtual machine (JCVM) |
499 | 22.2.1 | 1 | Java Card runtime environment (JCRE) | Java card runtime environment (JCRE) |
508 | 22.5.1 | 2 | Proprietary Application Identifier Extension (PIX) | proprietary application identifier extension (PIX) |
515 | 23.1 | 1 | Mobile information device profile (MIDP) | mobile information device profile (MIDP) |
515 | 23.1 | 1 | Application protocol data unit (APDU) | application protocol data unit (APDU) |
517 | 23.1.1 | 1 | Java card remote method invocation (JCRMI) | Java card remote method invocation (JCRMI) |
517 | 23.1.1 | 8 | Remote Method Interface (RMI) | remote method interface (RMI) |
517 | 23.1.1 | 8 | Generic Connection Framework (GCF) | generic connection framework (GCF) |
517 | 23.1.1 | 8 | Java Card Remote Method Invocation (JCRMI) | Java card remote method invocation (JCRMI) |
518 | 23.1.2 | 4 | Java card virtual machine (JCVM) | Java card virtual machine (JCVM) |
518 | 23.1.2 | 4 | Java virtual machine (JVM) | Java virtual machine (JVM) |
519 | 23.2.1 | 2 | Integrated Development Environment (IDE) | integrated development environment (IDE) |
519 | 23.2.1 | 12 | Connected limited device configuration (CLDC) | connected limited device configuration (CLDC) |
519 | 23.2.1 | 12 | Over-the-air (OTA) | over-the-air (OTA) |
519 | 23.2.1 | 12 | Java Community Process (JCP) | Java community process (JCP) |
519 | 23.2.1 | 14 | Mobile Information Device Profile (MIDP) | Mobile information device profile (MIDP) |
519 | 23.2.1 | 15 | Connected Limited Device Configuration (CLDC) | Connected limited device configuration (CLDC) |
521 | 23.2.1 | 1 | Generic connection framework (GCF) | generic connection framework (GCF) |
521 | 23.2.1 | 3 | Answer-to-reset (ATR) | answer-to-reset (ATR) |
521 | 23.2.1 | 3 | Personal Identification Number (PIN) | personal identification number (PIN) |
521 | 23.2.1 | 4 | Application identifier (AID) | application identifier (AID) |
521 | 23.2.1 | 4 | Uniform resource locator (URL) | uniform resource locator (URL) |
523 | 23.2.1.2 | 1 | Java application descriptor (JAD) | Java application descriptor (JAD) |
527 | 23.2.2.1 | 1 | Application identifier (AID) | application identifier (AID) |
542 | 24.1 | 1 | Near Field Communication | near field communication |
542 | 24.2 | Heading | Sun Small Programmable Object Technology (SPOTs) | Sun small programmable object technology (SPOTs) |
542 | 24.2.1 | 1 | Link Quality Routing Protocol | link quality routing protocol |
553 | 24.3.4.2 | 1 | Integrated Development Environment (IDE) | integrated development environment (IDE) |
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this chapter
Cite this chapter
Markantonakis, K., Mayes, K. (2014). Errata to: Secure Smart Embedded Devices, Platforms and Applications. In: Markantonakis, K., Mayes, K. (eds) Secure Smart Embedded Devices, Platforms and Applications. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7915-4_26
Download citation
DOI: https://doi.org/10.1007/978-1-4614-7915-4_26
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-7914-7
Online ISBN: 978-1-4614-7915-4
eBook Packages: Computer ScienceComputer Science (R0)