Secure Boot and Secure Download - Part 2: Technologies Behind Embedded Security
Part 2 of this video series provides a high-level overview of the technologies in embedded system security. Learn how the cryptographic tools of Maxim’s secure authenticators help verify the authenticity and integrity of firmware distributed to IoT devices. To see a specific application of a cost-effective, hardware-based IoT security solution, watch the next video in the series, “Secure Boot and Secure Download - Part 3: Using the DS28C36.”
Secure Boot and Secure Download - Part 2: Technologies Behind Embedded Security
Part 2 of this video series provides a high-level overview of the technologies in embedded system security. Learn how the cryptographic tools of Maxim’s secure authenticators help verify the authenticity and integrity of firmware distributed to IoT devices. To see a specific application of a cost-effective, hardware-based IoT security solution, watch the next video in the series, “Secure Boot and Secure Download - Part 3: Using the DS28C36.”
{{modalTitle}}
{{modalDescription}}
{{dropdownTitle}}
- {{defaultSelectedText}} {{#each projectNames}}
- {{name}} {{/each}} {{#if newProjectText}}
- {{newProjectText}} {{/if}}
{{newProjectTitle}}
{{projectNameErrorText}}