|
|
|
|
LEADER |
03356nam a22004455i 4500 |
001 |
978-3-658-07005-2 |
003 |
DE-He213 |
005 |
20140825163135.0 |
007 |
cr nn 008mamaa |
008 |
140825s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783658070052
|9 978-3-658-07005-2
|
024 |
7 |
|
|a 10.1007/978-3-658-07005-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA75.5-76.95
|
050 |
|
4 |
|a TK7885-7895
|
072 |
|
7 |
|a UK
|2 bicssc
|
072 |
|
7 |
|a COM067000
|2 bisacsh
|
082 |
0 |
4 |
|a 004
|2 23
|
100 |
1 |
|
|a Feller, Thomas.
|e author.
|
245 |
1 |
0 |
|a Trustworthy Reconfigurable Systems
|h [electronic resource] :
|b Enhancing the Security Capabilities of Reconfigurable Hardware Architectures /
|c by Thomas Feller.
|
264 |
|
1 |
|a Wiesbaden :
|b Springer Fachmedien Wiesbaden :
|b Imprint: Springer Vieweg,
|c 2014.
|
300 |
|
|
|a XX, 212 p. 35 illus., 15 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Introduction -- Trustworthy Computing.- Requirements for Trustworthiness -- Design Security and Cyber-Physical Threats -- Towards Trustworthy Cyber-Physical Systems -- Application Scenarios -- Summary.
|
520 |
|
|
|a Thomas Feller sheds some light on trust anchor architectures for trustworthy reconfigurable systems. He is presenting novel concepts enhancing the security capabilities of reconfigurable hardware. Almost invisible to the user, many computer systems are embedded into everyday artifacts, such as cars, ATMs, and pacemakers. The significant growth of this market segment within the recent years enforced a rethinking with respect to the security properties and the trustworthiness of these systems. The trustworthiness of a system in general equates to the integrity of its system components. Hardware-based trust anchors provide measures to compare the system configuration to reference measurements. Reconfigurable architectures represent a special case in this regard, as in addition to the software implementation, the underlying hardware architecture may be exchanged, even during runtime. Contents Trustworthy Systems, Reconfigurable Architectures FPGA Design Security, Authenticated Encryption Physical Attack Resistance, System Security Target Groups Researchers and students in the field of reconfigurable hardware architectures with an emphasis on secure and trustworthy systems Practitioners using reconfigurable architectures and need to provide a high level of protection against overproduction and counterfeiting. The Author Thomas Feller finished his doctoral thesis at the Center of Advanced Security Research (CASED) and the department of Integrated Circuits and Systems Lab, Technische Universität Darmstadt, under the supervision of Prof. Dr.-Ing. Sorin A. Huss.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer hardware.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Hardware.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783658070045
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-658-07005-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|