Secure System Design and Trustable Computing

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, f...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chang, Chip-Hong (Επιμελητής έκδοσης), Potkonjak, Miodrag (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2016.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03076nam a22004815i 4500
001 978-3-319-14971-4
003 DE-He213
005 20151204152423.0
007 cr nn 008mamaa
008 150917s2016 gw | s |||| 0|eng d
020 |a 9783319149714  |9 978-3-319-14971-4 
024 7 |a 10.1007/978-3-319-14971-4  |2 doi 
040 |d GrThAP 
050 4 |a TK7888.4 
072 7 |a TJFC  |2 bicssc 
072 7 |a TEC008010  |2 bisacsh 
082 0 4 |a 621.3815  |2 23 
245 1 0 |a Secure System Design and Trustable Computing  |h [electronic resource] /  |c edited by Chip-Hong Chang, Miodrag Potkonjak. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2016. 
300 |a XII, 537 p. 202 illus., 96 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Part I : Hardware Security Primitives -- Disorder-Based Security Hardware: An Overview -- Design and Implementation of High-Quality Physical Unclonable Functions for Hardware-oriented Cryptography -- Digital Bimodal Functions and Digital Physical Unclonable Functions: Architecture and Applications -- Residue number systems in cryptography: design, challenges, robustness -- Fault Attacks on AES and their Countermeasures -- Hardware Counterfeiting and Integrity Protection -- Circuit Timing Signature (CTS) for Detection of Counterfeit Integrated Circuits -- Hardware Trojan Detection in Analog/RF Integrated Circuits FPGAs -- Obfuscation-based Secure SoC Design for Protection against Piracy and Trojan Attacks -- Towards Building Trusted Systems: Vulnerabilities, Threats and Mitigation Techniques -- Hardware IP Watermarking and Fingerprinting. 
520 |a This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions, and networking services.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures. 
650 0 |a Engineering. 
650 0 |a Computer security. 
650 0 |a Electronics. 
650 0 |a Microelectronics. 
650 0 |a Electronic circuits. 
650 1 4 |a Engineering. 
650 2 4 |a Circuits and Systems. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Electronics and Microelectronics, Instrumentation. 
700 1 |a Chang, Chip-Hong.  |e editor. 
700 1 |a Potkonjak, Miodrag.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319149707 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-14971-4  |z Full Text via HEAL-Link 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647)