This book provides a comprehensive review of emerging security threats and privacy protection issues, and the versatile state-of-the-art hardware-based security countermeasures proposed by the hardware security community. It serves as an advanced reference for researchers on current hardware security problems, challenges and solutions.
This book provides a comprehensive review of emerging security threats and privacy protection issues, and the versatile state-of-the-art hardware-based security countermeasures proposed by the hardware security community. It serves as an advanced reference for researchers on current hardware security problems, challenges and solutions.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
1. Part I: Hardware security threats * Chapter 1: IP/IC piracy threats of reversible circuits * Chapter 2: Improvements and recent updates of persistent fault analysis on block ciphers * Chapter 3: Deployment of EMC techniques in design of IC chips for hardware security 2. Part II: Design for security * Chapter 4: Hardware obfuscation for IP protection * Chapter 5: Formal verification for SoC security * Chapter 6: Silicon-based true random number generators * Chapter 7: Micro-architectural attacks and countermeasures on public-key implementations * Chapter 8: Mitigating the CACHEKIT attack * Chapter 9: Deep learning network security * Chapter 10: Security implications of non-digital components * Chapter 11: Accelerating homomorphic encryption in hardware: a review * Chapter 12: Information leakage from robust codes protecting cryptographic primitives 3. Part III: Physical-layer security * Chapter 13: Confidential and energy-efficient cognitive communications by physical-layer security * Chapter 14: Physical-layer security for mmWave massive MIMO communications in 5G networks * Chapter 15: Security of in-vehicle controller area network: a review and future directions
1. Part I: Hardware security threats * Chapter 1: IP/IC piracy threats of reversible circuits * Chapter 2: Improvements and recent updates of persistent fault analysis on block ciphers * Chapter 3: Deployment of EMC techniques in design of IC chips for hardware security 2. Part II: Design for security * Chapter 4: Hardware obfuscation for IP protection * Chapter 5: Formal verification for SoC security * Chapter 6: Silicon-based true random number generators * Chapter 7: Micro-architectural attacks and countermeasures on public-key implementations * Chapter 8: Mitigating the CACHEKIT attack * Chapter 9: Deep learning network security * Chapter 10: Security implications of non-digital components * Chapter 11: Accelerating homomorphic encryption in hardware: a review * Chapter 12: Information leakage from robust codes protecting cryptographic primitives 3. Part III: Physical-layer security * Chapter 13: Confidential and energy-efficient cognitive communications by physical-layer security * Chapter 14: Physical-layer security for mmWave massive MIMO communications in 5G networks * Chapter 15: Security of in-vehicle controller area network: a review and future directions
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826