81,95 €
81,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
41 °P sammeln
81,95 €
81,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
41 °P sammeln
Als Download kaufen
81,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
41 °P sammeln
Jetzt verschenken
81,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
41 °P sammeln
  • Format: PDF

This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs. The authors provide a comprehensive study of the various approaches that are used to mitigate PUFs' shortcomings, while at the same time highlighting those that are most efficient. Coverage also includes state-of-the-art approaches to designing PUFs with high resilience to machine learning attacks and hardware implementation of…mehr

  • Geräte: PC
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 21.18MB
Produktbeschreibung
This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs. The authors provide a comprehensive study of the various approaches that are used to mitigate PUFs' shortcomings, while at the same time highlighting those that are most efficient. Coverage also includes state-of-the-art approaches to designing PUFs with high resilience to machine learning attacks and hardware implementation of area-efficient and high performing PUF architectures. The authors also classify different IoT applications and devices, depending on their security needs and limitations, offering a new perspective on how different PUF designs fit in the overall scope of IoT security.

  • Classifies Physically Unclonable designs and their hardware implementations based on application needs;
  • Explores advanced PUF techniques and protocols to enhance security for end nodes and edge devices;
  • Presents state-of-the-art techniques and protocols to enhance the security and effectiveness of PUF devices.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Dr. Kasem Khalil is an assistant professor in the Department of Electrical and Computer Engineering, University of Mississippi.

Haytham Idriss is an Assistant Professor in the Department of Computer Science, at the Purdue University Fort Wayne.

Tarek Idriss is an Associate Professor in the Department of Computer Science, at Western Washington University.

Dr. Magdy A. Bayoumi is Director of The Center for Advanced Computer Studies (CACS), and Department Head of the Computer Science Department at the University of Louisiana at Lafayette (UL Lafayette). He is also the Z.L. Loflin Eminent Scholar Endowed Chair Professor in Computer Science.