Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Using imperfect semiconductor system...
~
Roberts, Jonathan.
Using imperfect semiconductor systems for unique identification
Record Type:
Electronic resources : Monograph/item
Title/Author:
Using imperfect semiconductor systems for unique identificationby Jonathan Roberts.
Author:
Roberts, Jonathan.
Published:
Cham :Springer International Publishing :2017.
Description:
xv, 123 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Semiconductors.
Online resource:
http://dx.doi.org/10.1007/978-3-319-67891-7
ISBN:
9783319678917$q(electronic bk.)
Using imperfect semiconductor systems for unique identification
Roberts, Jonathan.
Using imperfect semiconductor systems for unique identification
[electronic resource] /by Jonathan Roberts. - Cham :Springer International Publishing :2017. - xv, 123 p. :ill., digital ;24 cm. - Springer theses,2190-5053. - Springer theses..
An Introduction to Security Based on Physical Disorder -- An Introduction to Semiconductors and Quantum Confinement -- Sample Preparation and Experimental Techniques -- Unique Identification with Resonant Tunneling Diodes -- Langmuir-Blodgett Deposition of 2D Materials for Unique Identification -- Building Optoelectronic Heterostructures with the Langmuir-Blodgett Technique -- Conclusions and Future Work.
This thesis describes novel devices for the secure identification of objects or electronic systems. The identification relies on the the atomic-scale uniqueness of semiconductor devices by measuring a macroscopic quantum property of the system in question. Traditionally, objects and electronic systems have been securely identified by measuring specific characteristics: common examples include passwords, fingerprints used to identify a person or an electronic device, and holograms that can tag a given object to prove its authenticity. Unfortunately, modern technologies also make it possible to circumvent these everyday techniques. Variations in quantum properties are amplified by the existence of atomic-scale imperfections. As such, these devices are the hardest possible systems to clone. They also use the least resources and provide robust security. Hence they have tremendous potential significance as a means of reliably telling the good guys from the bad.
ISBN: 9783319678917$q(electronic bk.)
Standard No.: 10.1007/978-3-319-67891-7doiSubjects--Topical Terms:
182134
Semiconductors.
LC Class. No.: QA402 / .R634 2017
Dewey Class. No.: 530
Using imperfect semiconductor systems for unique identification
LDR
:02369nmm a2200325 a 4500
001
522436
003
DE-He213
005
20180327132820.0
006
m d
007
cr nn 008maaau
008
180521s2017 gw s 0 eng d
020
$a
9783319678917$q(electronic bk.)
020
$a
9783319678900$q(paper)
024
7
$a
10.1007/978-3-319-67891-7
$2
doi
035
$a
978-3-319-67891-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA402
$b
.R634 2017
072
7
$a
TJFD5
$2
bicssc
072
7
$a
TEC008090
$2
bisacsh
082
0 4
$a
530
$2
23
090
$a
QA402
$b
.R645 2017
100
1
$a
Roberts, Jonathan.
$3
710341
245
1 0
$a
Using imperfect semiconductor systems for unique identification
$h
[electronic resource] /
$c
by Jonathan Roberts.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2017.
300
$a
xv, 123 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Springer theses,
$x
2190-5053
505
0
$a
An Introduction to Security Based on Physical Disorder -- An Introduction to Semiconductors and Quantum Confinement -- Sample Preparation and Experimental Techniques -- Unique Identification with Resonant Tunneling Diodes -- Langmuir-Blodgett Deposition of 2D Materials for Unique Identification -- Building Optoelectronic Heterostructures with the Langmuir-Blodgett Technique -- Conclusions and Future Work.
520
$a
This thesis describes novel devices for the secure identification of objects or electronic systems. The identification relies on the the atomic-scale uniqueness of semiconductor devices by measuring a macroscopic quantum property of the system in question. Traditionally, objects and electronic systems have been securely identified by measuring specific characteristics: common examples include passwords, fingerprints used to identify a person or an electronic device, and holograms that can tag a given object to prove its authenticity. Unfortunately, modern technologies also make it possible to circumvent these everyday techniques. Variations in quantum properties are amplified by the existence of atomic-scale imperfections. As such, these devices are the hardest possible systems to clone. They also use the least resources and provide robust security. Hence they have tremendous potential significance as a means of reliably telling the good guys from the bad.
650
0
$a
Semiconductors.
$3
182134
650
0
$a
System identification.
$3
182015
650
1 4
$a
Physics.
$3
179414
650
2 4
$a
Security Science and Technology.
$3
510148
650
2 4
$a
Optical and Electronic Materials.
$3
274099
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Springer theses.
$3
557607
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-67891-7
950
$a
Physics and Astronomy (Springer-11651)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000147408
電子館藏
1圖書
電子書
EB QA402 R645 2017
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-319-67891-7
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login