000 | 04189nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-319-76804-5 | ||
003 | DE-He213 | ||
005 | 20210201191414.0 | ||
007 | cr nn 008mamaa | ||
008 | 180418s2018 gw | s |||| 0|eng d | ||
020 |
_a9783319768045 _9978-3-319-76804-5 |
||
050 | 4 | _aTK7888.4 | |
072 | 7 |
_aTJFC _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aTJFC _2thema |
|
082 | 0 | 4 |
_a621.3815 _223 |
100 | 1 |
_aHalak, Basel. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aPhysically Unclonable Functions _h[electronic resource] : _bFrom Basic Design Principles to Advanced Hardware Security Applications / _cby Basel Halak. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXIX, 250 p. 92 illus., 62 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
500 | _aAcceso multiusuario | ||
505 | 0 | _aA Primer on Cryptographic Primitives and Security Attacks -- Physically Unclonable Functions: Design Principles and Evaluation Metrics -- Reliability Challenges of Silicon-Based Physically Unclonable Functions -- Reliability Enhancement Techniques for Physically Unclonable Functions -- Security Attacks on Physically Unclonable Functions and Possible Countermeasures -- Hardware-based Security Applications of Physically Unclonable Functions -- Appendix 1 -- Appendix 2 -- Appendix 3. | |
520 | _aThis book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book: Provides readers with a comprehensive overview of security threats on embedded systems and existing countermeasures; Includes an intensive tutorial on how to design and evaluate physically unclonable functions, supported by circuit diagrams and exemplar hardware implementations; Discusses the reliability challenges facing PUF technology and explains in details the state of the art mitigation approaches adopted, including those based on error correction codes and/or pre-processing techniques; Gives a comprehensive tutorial on the security threats facing PUF technology, including modelling attacks using machine learning algorithms, side channel analysis, and physical attacks. It also outlines possible countermeasures and defence mechanisms; Explains in detailed the practical applications of PUF technology, these include secure cryptographic key generation and storage, hardware-assisted security protocols, low cost secure sensors, anti-counterfeit integrated circuits and anti-tamper hardware. This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading. . | ||
541 |
_fUABC ; _cTemporal ; _d01/01/2021-12/31/2023. |
||
650 | 0 | _aElectronic circuits. | |
650 | 0 | _aMicroprocessors. | |
650 | 0 | _aSignal processing. | |
650 | 0 | _aImage processing. | |
650 | 0 | _aSpeech processing systems. | |
650 | 1 | 4 |
_aCircuits and Systems. _0https://scigraph.springernature.com/ontologies/product-market-codes/T24068 |
650 | 2 | 4 |
_aProcessor Architectures. _0https://scigraph.springernature.com/ontologies/product-market-codes/I13014 |
650 | 2 | 4 |
_aSignal, Image and Speech Processing. _0https://scigraph.springernature.com/ontologies/product-market-codes/T24051 |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319768038 |
776 | 0 | 8 |
_iPrinted edition: _z9783319768052 |
776 | 0 | 8 |
_iPrinted edition: _z9783030082932 |
856 | 4 | 0 |
_zLibro electrónico _uhttp://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-3-319-76804-5 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cLIBRO_ELEC | ||
999 |
_c243126 _d243125 |