Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Physically unclonable functionsfrom ...
~
Halak, Basel.
Physically unclonable functionsfrom basic design principles to advanced hardware security applications /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Physically unclonable functionsby Basel Halak.
Reminder of title:
from basic design principles to advanced hardware security applications /
Author:
Halak, Basel.
Published:
Cham :Springer International Publishing :2018.
Description:
xix, 250 p. :ill. (some color, digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Computer security.
Online resource:
http://dx.doi.org/10.1007/978-3-319-76804-5
ISBN:
9783319768045$q(electronic bk.)
Physically unclonable functionsfrom basic design principles to advanced hardware security applications /
Halak, Basel.
Physically unclonable functions
from basic design principles to advanced hardware security applications /[electronic resource] :by Basel Halak. - Cham :Springer International Publishing :2018. - xix, 250 p. :ill. (some color, digital ;24 cm.
A Primer on Cryptographic Primitives and Security Attacks -- Physically Unclonable Functions: Design Principles and Evaluation Metrics -- Reliability Challenges of Silicon-Based Physically Unclonable Functions -- Reliability Enhancement Techniques for Physically Unclonable Functions -- Security Attacks on Physically Unclonable Functions and Possible Countermeasures -- Hardware-based Security Applications of Physically Unclonable Functions -- Appendix 1 -- Appendix 2 -- Appendix 3.
This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book: Provides readers with a comprehensive overview of security threats on embedded systems and existing countermeasures; Includes an intensive tutorial on how to design and evaluate physically unclonable functions, supported by circuit diagrams and exemplar hardware implementations; Discusses the reliability challenges facing PUF technology and explains in details the state of the art mitigation approaches adopted, including those based on error correction codes and/or pre-processing techniques; Gives a comprehensive tutorial on the security threats facing PUF technology, including modelling attacks using machine learning algorithms, side channel analysis, and physical attacks. It also outlines possible countermeasures and defence mechanisms; Explains in detailed the practical applications of PUF technology, these include secure cryptographic key generation and storage, hardware-assisted security protocols, low cost secure sensors, anti-counterfeit integrated circuits and anti-tamper hardware. This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.
ISBN: 9783319768045$q(electronic bk.)
Standard No.: 10.1007/978-3-319-76804-5doiSubjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25 / H35 2018
Dewey Class. No.: 005.8
Physically unclonable functionsfrom basic design principles to advanced hardware security applications /
LDR
:02913nmm a2200313 a 4500
001
537796
003
DE-He213
005
20181112092623.0
006
m d
007
cr nn 008maaau
008
190116s2018 gw s 0 eng d
020
$a
9783319768045$q(electronic bk.)
020
$a
9783319768038$q(paper)
024
7
$a
10.1007/978-3-319-76804-5
$2
doi
035
$a
978-3-319-76804-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
H35 2018
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
H157 2018
100
1
$a
Halak, Basel.
$3
814908
245
1 0
$a
Physically unclonable functions
$h
[electronic resource] :
$b
from basic design principles to advanced hardware security applications /
$c
by Basel Halak.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
xix, 250 p. :
$b
ill. (some color, digital ;
$c
24 cm.
505
0
$a
A Primer on Cryptographic Primitives and Security Attacks -- Physically Unclonable Functions: Design Principles and Evaluation Metrics -- Reliability Challenges of Silicon-Based Physically Unclonable Functions -- Reliability Enhancement Techniques for Physically Unclonable Functions -- Security Attacks on Physically Unclonable Functions and Possible Countermeasures -- Hardware-based Security Applications of Physically Unclonable Functions -- Appendix 1 -- Appendix 2 -- Appendix 3.
520
$a
This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book: Provides readers with a comprehensive overview of security threats on embedded systems and existing countermeasures; Includes an intensive tutorial on how to design and evaluate physically unclonable functions, supported by circuit diagrams and exemplar hardware implementations; Discusses the reliability challenges facing PUF technology and explains in details the state of the art mitigation approaches adopted, including those based on error correction codes and/or pre-processing techniques; Gives a comprehensive tutorial on the security threats facing PUF technology, including modelling attacks using machine learning algorithms, side channel analysis, and physical attacks. It also outlines possible countermeasures and defence mechanisms; Explains in detailed the practical applications of PUF technology, these include secure cryptographic key generation and storage, hardware-assisted security protocols, low cost secure sensors, anti-counterfeit integrated circuits and anti-tamper hardware. This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.
650
0
$a
Computer security.
$3
184416
650
0
$a
Internet of things
$x
Security measures.
$3
770009
650
1 4
$a
Engineering.
$3
210888
650
2 4
$a
Circuits and Systems.
$3
274416
650
2 4
$a
Processor Architectures.
$3
274498
650
2 4
$a
Signal, Image and Speech Processing.
$3
273768
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-76804-5
950
$a
Engineering (Springer-11647)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000157667
電子館藏
1圖書
電子書
EB QA76.9.A25 H157 2018
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-319-76804-5
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login