- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book presents advanced forensic detective control and obfuscation techniques for securing hardware IP cores by exploring beyond conventional technologies.
Andere Kunden interessierten sich auch für
- Khaled Salah MohamedIP Cores Design from Specifications to Production37,99 €
- Frontiers in Hardware Security and Trust: Theory, Design and Practice170,99 €
- Bouraoui OuniHardware IP cores for Mathematical Operations36,99 €
- Anirban SenguptaIP Core Protection and Hardware-Assisted Security for Consumer Electronics183,99 €
- Power Electronic Converters and Systems: Frontiers and Applications212,99 €
- Emerging Trends for Securing Cyber Physical Systems and the Internet of Things171,99 €
- Mobile Security: A Comprehensive Guide to Securing Information159,99 €
-
-
-
This book presents advanced forensic detective control and obfuscation techniques for securing hardware IP cores by exploring beyond conventional technologies.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Institution of Engineering & Technology
- Seitenzahl: 344
- Erscheinungstermin: 3. Januar 2020
- Englisch
- Abmessung: 241mm x 157mm x 20mm
- Gewicht: 680g
- ISBN-13: 9781839530319
- ISBN-10: 1839530316
- Artikelnr.: 58408015
- Herstellerkennzeichnung
- Produktsicherheitsverantwortliche/r
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Institution of Engineering & Technology
- Seitenzahl: 344
- Erscheinungstermin: 3. Januar 2020
- Englisch
- Abmessung: 241mm x 157mm x 20mm
- Gewicht: 680g
- ISBN-13: 9781839530319
- ISBN-10: 1839530316
- Artikelnr.: 58408015
- Herstellerkennzeichnung
- Produktsicherheitsverantwortliche/r
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Anirban Sengupta (PhD, FIET, FBCS) is an Associate Professor in Computer Science and Engineering at the Indian Institute of Technology (I.I.T) Indore. He has over 205 publications, 3 Books and 11 Patents and is an IEEE Distinguished Visitor of the IEEE Computer Society as well as an IEEE Distinguished Lecturer at the IEEE Consumer Electronics Society. He is an elected Fellow of the IET and Fellow of the British Computer Society. He is also the Deputy EiC of IET Computers and Digital Techniques and Chair, EiC of the IEEE Computer Society Technical Committee on VLSI as well as holding Editorial positions in more than a dozen IEEE Transactions/Journals/Magazines. He has held many Chair positions in major IEEE flagship conferences and is recipient of several IEEE Honors such as IEEE Editor Awards and Best Paper Awards from Journals/Magazines and Conferences.
* Chapter 1: Introduction to hardware (IP) security: forensic detective
control and obfuscation of digital signal processing (DSP) cores
* Chapter 2: Forensic detective control using hardware steganography
for IP core protection
* Chapter 3: Forensic detective control using a digital signature-based
watermark for IP core protection
* Chapter 4: Protection of fault-secured IP cores using digital
signature-based watermarks
* Chapter 5: Multi-level watermark for IP protection
* Chapter 6: Protecting the rights of an IP buyer using
cryptosystem-based multivariable fingerprinting
* Chapter 7: Multi-phase obfuscation for fault-secured DSP circuits
* Chapter 8: Hologram-based structural obfuscation for DSP cores
* Chapter 9: Security of functionally obfuscated DSP cores
control and obfuscation of digital signal processing (DSP) cores
* Chapter 2: Forensic detective control using hardware steganography
for IP core protection
* Chapter 3: Forensic detective control using a digital signature-based
watermark for IP core protection
* Chapter 4: Protection of fault-secured IP cores using digital
signature-based watermarks
* Chapter 5: Multi-level watermark for IP protection
* Chapter 6: Protecting the rights of an IP buyer using
cryptosystem-based multivariable fingerprinting
* Chapter 7: Multi-phase obfuscation for fault-secured DSP circuits
* Chapter 8: Hologram-based structural obfuscation for DSP cores
* Chapter 9: Security of functionally obfuscated DSP cores
* Chapter 1: Introduction to hardware (IP) security: forensic detective
control and obfuscation of digital signal processing (DSP) cores
* Chapter 2: Forensic detective control using hardware steganography
for IP core protection
* Chapter 3: Forensic detective control using a digital signature-based
watermark for IP core protection
* Chapter 4: Protection of fault-secured IP cores using digital
signature-based watermarks
* Chapter 5: Multi-level watermark for IP protection
* Chapter 6: Protecting the rights of an IP buyer using
cryptosystem-based multivariable fingerprinting
* Chapter 7: Multi-phase obfuscation for fault-secured DSP circuits
* Chapter 8: Hologram-based structural obfuscation for DSP cores
* Chapter 9: Security of functionally obfuscated DSP cores
control and obfuscation of digital signal processing (DSP) cores
* Chapter 2: Forensic detective control using hardware steganography
for IP core protection
* Chapter 3: Forensic detective control using a digital signature-based
watermark for IP core protection
* Chapter 4: Protection of fault-secured IP cores using digital
signature-based watermarks
* Chapter 5: Multi-level watermark for IP protection
* Chapter 6: Protecting the rights of an IP buyer using
cryptosystem-based multivariable fingerprinting
* Chapter 7: Multi-phase obfuscation for fault-secured DSP circuits
* Chapter 8: Hologram-based structural obfuscation for DSP cores
* Chapter 9: Security of functionally obfuscated DSP cores