Foundations of hardware IP protection
This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional...
Saved in:
| Other Authors | , |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Cham, Switzerland :
Springer,
2017.
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9783319503806 9783319503783 |
| Physical Description | 1 online resource |
Cover
| LEADER | 00000cam a2200000Ii 4500 | ||
|---|---|---|---|
| 001 | 99719 | ||
| 003 | CZ-ZlUTB | ||
| 005 | 20251008111958.0 | ||
| 006 | m o d | ||
| 007 | cr cnu|||unuuu | ||
| 008 | 170112s2017 sz o 001 0 eng d | ||
| 040 | |a N$T |b eng |e rda |e pn |c N$T |d GW5XE |d N$T |d IDEBK |d EBLCP |d YDX |d OCLCF |d UAB |d NJR |d COO |d UPM |d MERUC |d IOG |d VT2 |d UWO |d ESU |d JBG |d IAD |d ICW |d ICN |d OTZ |d OCLCQ |d U3W |d CAUOI |d KSU |d AU@ |d OCLCQ |d WYU |d UKMGB |d UKAHL |d OCLCQ |d ERF |d UKBTH |d LEATE |d OCLCQ | ||
| 020 | |a 9783319503806 |q (electronic bk.) | ||
| 020 | |z 9783319503783 |q (print) | ||
| 024 | 7 | |a 10.1007/978-3-319-50380-6 |2 doi | |
| 035 | |a (OCoLC)968211937 |z (OCoLC)968508254 |z (OCoLC)974649834 |z (OCoLC)981035112 |z (OCoLC)981774790 |z (OCoLC)1005756114 |z (OCoLC)1011994125 |z (OCoLC)1048135117 |z (OCoLC)1058385632 |z (OCoLC)1066476514 |z (OCoLC)1086532864 |z (OCoLC)1112575274 |z (OCoLC)1113385248 |z (OCoLC)1113625226 |z (OCoLC)1116183742 |z (OCoLC)1122847277 | ||
| 245 | 0 | 0 | |a Foundations of hardware IP protection / |c Lilian Bossuet, Lionel Torres, editors. |
| 264 | 1 | |a Cham, Switzerland : |b Springer, |c 2017. | |
| 300 | |a 1 online resource | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a počítač |b c |2 rdamedia | ||
| 338 | |a online zdroj |b cr |2 rdacarrier | ||
| 500 | |a Includes index. | ||
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
| 520 | |a This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection. · Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP; · Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security; · Introduce designers to the concept of salutary hardware, difficult to circumvent embedded hardware security systems. | ||
| 505 | 0 | |a Digital Right Management for IP Protection -- Turning Electronic Circuits Features into On-Chip Locks -- Logic Modification-Based IP Protection Methods: An Overview and a Proposal -- IP FSM Watermarking -- Side Channel Analysis, an Efficient Ally for IP Protection -- Hardware Obfuscation -- An application of Partial Hardware Reverse Engineering for the Detection of Hardware Trojan -- Linear Complementary Codes: Novel Hardware Trojan Prevention and Detection Approach -- Ultra-Lightweight Implementation in Area of Block Ciphers -- Enhancing Secure Elements? Technology and Architecture. | |
| 590 | |a SpringerLink |b Springer Complete eBooks | ||
| 650 | 0 | |a Digital rights management. | |
| 650 | 0 | |a Intellectual property. | |
| 650 | 0 | |a Computers |x Law and legislation. | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 700 | 1 | |a Bossuet, Lilian, |e editor. | |
| 700 | 1 | |a Torres, Lionel, |e editor. | |
| 776 | 0 | 8 | |i Print version: |t Foundations of hardware IP protection. |d Cham, Switzerland : Springer, 2017 |z 3319503782 |z 9783319503783 |w (OCoLC)962127421 |
| 856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-3-319-50380-6 |
| 992 | |c NTK-SpringerENG | ||
| 999 | |c 99719 |d 99719 | ||
| 993 | |x NEPOSILAT |y EIZ | ||