Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains. The authors are experts in emerging technologies, traditional hardware design, and hardware security and trust. Readers will gain a comprehensive understanding of hardware security problems and how to overcome them through an efficient combination of conventional approaches and emerging technologies, enabling them to design secure, reliable, and trustworthy hardware.…mehr
This book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains. The authors are experts in emerging technologies, traditional hardware design, and hardware security and trust. Readers will gain a comprehensive understanding of hardware security problems and how to overcome them through an efficient combination of conventional approaches and emerging technologies, enabling them to design secure, reliable, and trustworthy hardware.
Mark Tehranipoor is currently the Intel Charles E. Young Preeminence Endowed Chair Professor in Cybersecurity at the Department of Electrical and Computer Engineering, the University of Florida. He has published over 500 journal articles and refereed conference papers and has delivered more than 200 invited talks and keynote addresses in international conferences, industry consortiums and government. In addition, he has 8 patents and has published 11 books and 25 book chapters. He is a recipient of 12 best paper awards and nominations, the 2009 NSF CAREER award, the 2014 MURI award on Nanoscale Security, the 2008 IEEE Computer Society (CS) Meritorious Service Award, the 2012 and 2017 IEEE CS Outstanding Contribution, the 2010 and 2016 IEEE TTTC/CS Most Successful Technical Event for co-founding and chairing HOST Symposium. He co-founded IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) and served as HOST-2008 and HOST-2009 General Chair and continues to serve as Chair of the Steering Committee for HOST. He also co-founded IEEE Asian-HOST. Further, he co-founded Journal on Hardware and Systems Security (HaSS) and currently serving as EIC for HaSS. He is also a co-founder of Trust-Hub. He served as associate Editor-in-Chief (EIC) for IEEE Design and Test of Computers from 2012-2014. He is currently serving as an Associate Editor for IEEE Design and Test of Computers, an Associate Editor for JETTA, an Associate Editor for Journal of Low Power Electronics (JOLPE), an Associate Editor for ACM Transactions for Design Automation of Electronic Systems (TODAES), and an Associate Editor for IEEE Transactions on VLSI (TVLSI). He has served as an IEEE Distinguished Speaker and an ACM Distinguished Speaker from 2010-2013. Dr. Tehranipoor is a Fellow of the IEEE, Golden Core Member of IEEE Computer Society, and Member of ACM and ACM SIGDA. He is also a member of the Connecticut Academy of Science and Engineering (CASE).
Inhaltsangabe
Introduction.- Blockchain for Supply Chain Integrity.- Backside is a new Backdoor.- Post-quantum HW Security.- Microfluidic device security.- ML in HW Security.- Digital Twin.- HLS Security Assessment.- CAD for SCA: SCRIPT.- Analog Obfuscation.- CAD for Physical Assurance.- Neuromorphic Security.- Post quantum Crypto Hardware.- Trillion Sensors Security.- Homomorphic Encryption.- Software Security with HW in Mind.- Security of Emerging Memories.- Firmware Obfuscation.- Computer Vision in HW Security.
Introduction.- Blockchain for Supply Chain Integrity.- Backside is a new Backdoor.- Post-quantum HW Security.- Microfluidic device security.- ML in HW Security.- Digital Twin.- HLS Security Assessment.- CAD for SCA: SCRIPT.- Analog Obfuscation.- CAD for Physical Assurance.- Neuromorphic Security.- Post quantum Crypto Hardware.- Trillion Sensors Security.- Homomorphic Encryption.- Software Security with HW in Mind.- Security of Emerging Memories.- Firmware Obfuscation.- Computer Vision in HW Security.
Introduction.- Blockchain for Supply Chain Integrity.- Backside is a new Backdoor.- Post-quantum HW Security.- Microfluidic device security.- ML in HW Security.- Digital Twin.- HLS Security Assessment.- CAD for SCA: SCRIPT.- Analog Obfuscation.- CAD for Physical Assurance.- Neuromorphic Security.- Post quantum Crypto Hardware.- Trillion Sensors Security.- Homomorphic Encryption.- Software Security with HW in Mind.- Security of Emerging Memories.- Firmware Obfuscation.- Computer Vision in HW Security.
Introduction.- Blockchain for Supply Chain Integrity.- Backside is a new Backdoor.- Post-quantum HW Security.- Microfluidic device security.- ML in HW Security.- Digital Twin.- HLS Security Assessment.- CAD for SCA: SCRIPT.- Analog Obfuscation.- CAD for Physical Assurance.- Neuromorphic Security.- Post quantum Crypto Hardware.- Trillion Sensors Security.- Homomorphic Encryption.- Software Security with HW in Mind.- Security of Emerging Memories.- Firmware Obfuscation.- Computer Vision in HW Security.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497