Frontiers in hardware security and trust theory, design and practice
The book consists of 15 chapters dealing with the following subjects: hardware security threats; IP/IC piracy threats of reversible circuits; persistent fault analysis on block ciphers; EMC techniques in design of IC chips; hardware obfuscation for IP protection; formal verification for SoC security...
Saved in:
Other Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Stevenage
The Institution of Engineering and Technology
2020
|
Series: | Materials, circuits and devices series ;
66. |
Subjects: | |
ISBN: | 1785619284 9781785619281 9781785619274 1785619276 |
Physical Description: | 1 online resource illustrations |
LEADER | 04692cam a22005177c 4500 | ||
---|---|---|---|
001 | kn-on1202624304 | ||
003 | OCoLC | ||
005 | 20240717213016.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 201019t20202021enka ob 001 0 eng d | ||
040 | |a STF |b eng |e rda |e pn |c STF |d OCLCO |d OCLCF |d EBLCP |d UKAHL |d CUV |d CUS |d OCL |d OCLCO |d N$T |d OCLCO |d K6U |d OCLCQ |d OCLCO |d OCLCL | ||
020 | |a 1785619284 |q electronic bk. | ||
020 | |a 9781785619281 |q (electronic bk.) | ||
020 | |z 9781785619274 | ||
020 | |z 1785619276 | ||
035 | |a (OCoLC)1202624304 | ||
245 | 0 | 0 | |a Frontiers in hardware security and trust |b theory, design and practice |c edited by Chip Hong Chang, Yuan Cao |
264 | 1 | |a Stevenage |b The Institution of Engineering and Technology |c 2020 | |
264 | 4 | |c ©2021 | |
300 | |a 1 online resource |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Materials, circuits and devices |v 66 | |
504 | |a Includes bibliographical references and index | ||
505 | 0 | |a IP/IC piracy threats of reversible circuits / Samah Mohamed Saeed -- Improvements and recent updates of persistent fault analysis on block ciphers / Fan Zhang, Bolin Yang, Guorui Xu, Xiaoxuan Lou, Shivam Bhasin, Xinjie Zhao, Shize Guo, and Kui Ren -- Deployment of EMC techniques in design of IC chips for hardware security / Makoto Nagata -- Hardware obfuscation for IP protection / Abdulrahman Alaql, Md Moshiur Rahman, Tamzidul Hoque, and Swarup Bhunia -- Formal verification for SoC security / Jiaji He, Xialong Guo, Yiqiang Zhao and Yier Jin -- Silicon-based true random number generators / Yuan Cao, Egbochukwu Chukwuemeka Chidiebere, Chenkai Fang, Mingrui Zhou, Wanyi Liu Xiaojin Zhao, and Chip-Hong Chang -- Micro-architectual attacks and countermeasures on public-key implementations / Sarani Bhattacharya and Debdeep Mukhopadhyay -- Mitigating the CacheKit attack / Mauricio Gutierrez, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, and Gail-Jon Ahn -- Deep learning network security / Si Wang and Chip-Hong Chang -- Security implications of non-digital components / Xiaoxi Ren, Xhe Zhou, Di Tang, and Kehuan Zhang -- Accelerating homomorphic encryption in hardware : a review / Truong Phu Truan Ho and Chip-Hong Chang -- Information leakage from robust codes protecting cryptographic primitives / Osnat Keren and Ilia Polian -- Confidential and energy-efficient cognitive communications by physical-layer security / Pin-Hsun Lin and Eduard A. Jorswieck -- Physical-layer security for mmWave massive MIMO communications in 5G networks / Ning Wang, Long Jiao, Jie Tang, and Kai Zeng -- Security of in-vehicle controller area network : a review and future directions / Zhaojun Lu, Qian Wang, Gang Qu, and Zhenglin Liu. | |
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a The book consists of 15 chapters dealing with the following subjects: hardware security threats; IP/IC piracy threats of reversible circuits; persistent fault analysis on block ciphers; EMC techniques in design of IC chips; hardware obfuscation for IP protection; formal verification for SoC security; silicon-based true random number generators; micro-architectural attacks and countermeasures on public-key implementations; CACHEKIT attack mitigation; deep learning network security; nondigital components; homomorphic encryption; information leakage from robust codes protecting cryptographic primitives; confidential and energy-efficient cognitive communications; physical-layer security; mm-wave massive MIMO communications in 5G networks; and in-vehicle controller area network | ||
590 | |a Knovel |b Knovel (All titles) | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Internet of things. | |
650 | 0 | |a Cell phone systems. | |
650 | 0 | |a Cognitive radio networks. | |
650 | 0 | |a Computer software |x Verification. | |
650 | 0 | |a Industrial property. | |
650 | 0 | |a Integrated circuits. | |
650 | 0 | |a Machine learning. | |
650 | 0 | |a Neural networks (Computer science) | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Chang, Chip-Hong, |e editor. | |
700 | 1 | |a Cao, Yuan, |e editor. | |
776 | 0 | 8 | |i Print version: |t Frontiers in hardware security and trust |d Stevenage : Institution of Engineering and Technology, 2020 |z 9781785619274 |w (OCoLC)1202844165 |
830 | 0 | |a Materials, circuits and devices series ; |v 66. | |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpFHSTTDP2/frontiers-in-hardware?kpromoter=marc |y Full text |