Secure System Design and Trustable Computing (Record no. 80080)

000 -LEADER
fixed length control field 03406nam a22005295i 4500
001 - CONTROL NUMBER
control field 978-3-319-14971-4
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801221818.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150917s2016 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319149714
-- 978-3-319-14971-4
082 04 - CLASSIFICATION NUMBER
Call Number 621.3815
245 10 - TITLE STATEMENT
Title Secure System Design and Trustable Computing
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2016.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XII, 537 p. 202 illus., 96 illus. in color.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Part I : Hardware Security Primitives -- Disorder-Based Security Hardware: An Overview -- Design and Implementation of High-Quality Physical Unclonable Functions for Hardware-oriented Cryptography -- Digital Bimodal Functions and Digital Physical Unclonable Functions: Architecture and Applications -- Residue number systems in cryptography: design, challenges, robustness -- Fault Attacks on AES and their Countermeasures -- Hardware Counterfeiting and Integrity Protection -- Circuit Timing Signature (CTS) for Detection of Counterfeit Integrated Circuits -- Hardware Trojan Detection in Analog/RF Integrated Circuits FPGAs -- Obfuscation-based Secure SoC Design for Protection against Piracy and Trojan Attacks -- Towards Building Trusted Systems: Vulnerabilities, Threats and Mitigation Techniques -- Hardware IP Watermarking and Fingerprinting.
520 ## - SUMMARY, ETC.
Summary, etc This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions, and networking services.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.
700 1# - AUTHOR 2
Author 2 Chang, Chip-Hong.
700 1# - AUTHOR 2
Author 2 Potkonjak, Miodrag.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-319-14971-4
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2016.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic circuits.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronics.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic Circuits and Systems.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronics and Microelectronics, Instrumentation.
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.