CABA Information Series

IS-2003-36: Welcome to the Real World – embedded security in action

This paper is the third in Certicom’s “Got Security?” White Paper series. It describes how to determine the right security model for a given device and set of user needs and addresses the challenges of providing security for data stored in resource-constrained devices and for data transmitted between devices. Hardware and software techniques are discussed. A checklist of security features that may be embedded in devices is included.


(Adobe PDF File)