000 | 03406nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-319-14971-4 | ||
003 | DE-He213 | ||
005 | 20220801221818.0 | ||
007 | cr nn 008mamaa | ||
008 | 150917s2016 sz | s |||| 0|eng d | ||
020 |
_a9783319149714 _9978-3-319-14971-4 |
||
024 | 7 |
_a10.1007/978-3-319-14971-4 _2doi |
|
050 | 4 | _aTK7867-7867.5 | |
072 | 7 |
_aTJFC _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aTJFC _2thema |
|
082 | 0 | 4 |
_a621.3815 _223 |
245 | 1 | 0 |
_aSecure System Design and Trustable Computing _h[electronic resource] / _cedited by Chip-Hong Chang, Miodrag Potkonjak. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXII, 537 p. 202 illus., 96 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aPart I : Hardware Security Primitives -- Disorder-Based Security Hardware: An Overview -- Design and Implementation of High-Quality Physical Unclonable Functions for Hardware-oriented Cryptography -- Digital Bimodal Functions and Digital Physical Unclonable Functions: Architecture and Applications -- Residue number systems in cryptography: design, challenges, robustness -- Fault Attacks on AES and their Countermeasures -- Hardware Counterfeiting and Integrity Protection -- Circuit Timing Signature (CTS) for Detection of Counterfeit Integrated Circuits -- Hardware Trojan Detection in Analog/RF Integrated Circuits FPGAs -- Obfuscation-based Secure SoC Design for Protection against Piracy and Trojan Attacks -- Towards Building Trusted Systems: Vulnerabilities, Threats and Mitigation Techniques -- Hardware IP Watermarking and Fingerprinting. | |
520 | _aThis book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions, and networking services. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures. | ||
650 | 0 |
_aElectronic circuits. _919581 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aElectronics. _93425 |
|
650 | 1 | 4 |
_aElectronic Circuits and Systems. _958121 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aElectronics and Microelectronics, Instrumentation. _932249 |
700 | 1 |
_aChang, Chip-Hong. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _958122 |
|
700 | 1 |
_aPotkonjak, Miodrag. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _958123 |
|
710 | 2 |
_aSpringerLink (Online service) _958124 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319149707 |
776 | 0 | 8 |
_iPrinted edition: _z9783319149721 |
776 | 0 | 8 |
_iPrinted edition: _z9783319352213 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-14971-4 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c80080 _d80080 |