Physically Unclonable Functions

Physically Unclonable Functions

Basel Halak

122,55 €
IVA incluido
Consulta disponibilidad
Editorial:
Springer Nature B.V.
Año de edición:
2018
ISBN:
9783319768038

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and existing countermeasures.This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.  

Artículos relacionados

  • Cases on Usability Engineering
    Information technologies play a significant role in modern information-driven societies, making a comprehensive understanding of digital media a fundamental requisite to success. Cases on Usability Engineering: Design and Development of Digital Products provides readers with case studies and real-life examples on usability methods and techniques to test the design and developme...
  • State-Of-The- Art Sensors Technology in France 2016
    This Special Issue aims to provide a comprehensive overview of state-of-the-art sensors technology in France. It includes research articles that consolidate our understanding of the state-of-the-art in this area and also four reviews on hot fields in sensor technology (nanomaterials, electronic tongue and optical fibre networks). ...
    Disponible

    59,78 €

  • VISIR HANDBOOK
    Gustavo R Alves / HERNANDEZ-JAYO UNAI / JAVIER GARCIA-ZUBIA / JAVIER GARCIA-ZUBIA UNAI HERNANDEZ-JAYO / Unai Hernández-Jayo
    In 2006, the Signal Processing Department at Blekinge Institute of Technology and Axiom EduTECH in Sweden worked with National Instruments Corporation in Texas, USA, to set up the Virtual Instrument Systems in Reality (VISIR) Project, which operates as a remote laboratory for electric and electronic circuits.The VISIR remote laboratory is currently the only system that delivers...
  • Neural Networks and Fuzzy Logic Control
    K. Sushita / N. Shanmugasundaram / T. R. Premila
    This textbook offers a unified engineering perspective on Neural Networks and Fuzzy Logic. The authors guide readers swiftly and succinctly through the intricate subjects of neural networks, fuzzy logic, and the mathematical modeling of Fuzzy Logic Control. The theory of fuzzy logic provides a mathematical framework to capture uncertainties related to human cognitive processes,...
    Disponible

    99,67 €

  • Tragbares System zur Messung der Außenluftqualität mit Arduino
    Mira Kartiwi / Teddy Surya Gunawan / Yasmin Mahira Saiful Munir
    Das jüngste Auftreten von Dunst in Malaysia hat die Öffentlichkeit dazu veranlasst, sich der aktuellen Luftqualität in ihrer Umgebung stärker bewusst zu werden. Denn Luftverschmutzung kann schwerwiegende Auswirkungen auf die menschliche Gesundheit und die Umwelt haben. Der Luftschadstoffindex (Air Pollutant Index, API) in Malaysia wird vom Umweltministerium (Department of Envir...
    Disponible

    61,36 €

  • Système portable de mesure de la qualité de l’air extérieur utilisant Arduino
    Mira Kartiwi / Teddy Surya Gunawan / Yasmin Mahira Saiful Munir
    L’apparition récente de la brume sèche en Malaisie a incité le public à être plus attentif à la qualité de l’air qui l’entoure. En effet, la pollution de l’air peut avoir de graves conséquences sur la santé humaine et l’environnement. L’indice des polluants atmosphériques (API) en Malaisie est mesuré par le ministère de l’environnement (DOE) à l’aide de stations de surveillance...
    Disponible

    61,42 €

Otros libros del autor

  • Machine Learning for Embedded System Security
    Basel Halak
    This book comprehensively covers the state-of-the-art security applications of machine learning techniques.  The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design...
    Disponible

    123,59 €

  • Machine Learning for Embedded System Security
    Basel Halak
    This book comprehensively covers the state-of-the-art security applications of machine learning techniques.  The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design...
  • Hardware Supply Chain Security
    Basel Halak
    This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new  type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets...
    Disponible

    111,49 €

  • Authentication of Embedded Devices
    Basel Halak
    This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Co...
    Disponible

    80,65 €

  • Hardware Supply Chain Security
    Basel Halak
    This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new  type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets...
  • Authentication of Embedded Devices
    Basel Halak
    This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Co...