|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-658-07005-2 |
003 |
DE-He213 |
005 |
20220116024418.0 |
007 |
cr nn 008mamaa |
008 |
140825s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783658070052
|9 978-3-658-07005-2
|
024 |
7 |
|
|a 10.1007/978-3-658-07005-2
|2 doi
|
050 |
|
4 |
|a TK7885-7895
|
072 |
|
7 |
|a UK
|2 bicssc
|
072 |
|
7 |
|a COM067000
|2 bisacsh
|
072 |
|
7 |
|a UK
|2 thema
|
082 |
0 |
4 |
|a 004
|2 23
|
100 |
1 |
|
|a Feller, Thomas.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Trustworthy Reconfigurable Systems
|h [electronic resource] :
|b Enhancing the Security Capabilities of Reconfigurable Hardware Architectures /
|c by Thomas Feller.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Wiesbaden :
|b Springer Fachmedien Wiesbaden :
|b Imprint: Springer Vieweg,
|c 2014.
|
300 |
|
|
|a XX, 212 p. 35 illus., 15 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Introduction -- Trustworthy Computing.- Requirements for Trustworthiness -- Design Security and Cyber-Physical Threats -- Towards Trustworthy Cyber-Physical Systems -- Application Scenarios -- Summary.
|
520 |
|
|
|a Thomas Feller sheds some light on trust anchor architectures for trustworthy reconfigurable systems. He is presenting novel concepts enhancing the security capabilities of reconfigurable hardware. Almost invisible to the user, many computer systems are embedded into everyday artifacts, such as cars, ATMs, and pacemakers. The significant growth of this market segment within the recent years enforced a rethinking with respect to the security properties and the trustworthiness of these systems. The trustworthiness of a system in general equates to the integrity of its system components. Hardware-based trust anchors provide measures to compare the system configuration to reference measurements. Reconfigurable architectures represent a special case in this regard, as in addition to the software implementation, the underlying hardware architecture may be exchanged, even during runtime. Contents Trustworthy Systems, Reconfigurable Architectures FPGA Design Security, Authenticated Encryption Physical Attack Resistance, System Security Target Groups Researchers and students in the field of reconfigurable hardware architectures with an emphasis on secure and trustworthy systems Practitioners using reconfigurable architectures and need to provide a high level of protection against overproduction and counterfeiting. The Author Thomas Feller finished his doctoral thesis at the Center of Advanced Security Research (CASED) and the department of Integrated Circuits and Systems Lab, Technische Universität Darmstadt, under the supervision of Prof. Dr.-Ing. Sorin A. Huss.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
1 |
4 |
|a Computer Hardware.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783658070069
|
776 |
0 |
8 |
|i Printed edition:
|z 9783658070045
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-658-07005-2
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|