Cargando…

Frontiers in hardware security and trust theory, design and practice

The book consists of 15 chapters dealing with the following subjects: hardware security threats; IP/IC piracy threats of reversible circuits; persistent fault analysis on block ciphers; EMC techniques in design of IC chips; hardware obfuscation for IP protection; formal verification for SoC security...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Chang, Chip-Hong (Editor ), Cao, Yuan (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Stevenage The Institution of Engineering and Technology 2020
Colección:Materials, circuits and devices series ; 66.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a22000007c 4500
001 KNOVEL_on1202624304
003 OCoLC
005 20231027140348.0
006 m o d
007 cr cn|||||||||
008 201019t20202021enka ob 001 0 eng d
040 |a STF  |b eng  |e rda  |e pn  |c STF  |d OCLCO  |d OCLCF  |d EBLCP  |d UKAHL  |d CUV  |d CUS  |d OCL  |d OCLCO  |d N$T  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO 
020 |a 1785619284  |q electronic bk. 
020 |a 9781785619281  |q (electronic bk.) 
020 |z 9781785619274 
020 |z 1785619276 
029 1 |a AU@  |b 000068170308 
035 |a (OCoLC)1202624304 
050 4 |a QA76.9.A25 
072 7 |a B0100  |2 inspec 
072 7 |a B2570  |2 inspec 
072 7 |a B6250  |2 inspec 
072 7 |a C0000  |2 inspec 
072 7 |a C5290  |2 inspec 
072 7 |a C5230  |2 inspec 
072 7 |a C5620L  |2 inspec 
072 7 |a C6130S  |2 inspec 
072 7 |a C5480  |2 inspec 
082 0 4 |a 005.8 
049 |a UAMI 
245 0 0 |a Frontiers in hardware security and trust  |b theory, design and practice  |c edited by Chip Hong Chang, Yuan Cao 
264 1 |a Stevenage  |b The Institution of Engineering and Technology  |c 2020 
264 4 |c ©2021 
300 |a 1 online resource  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Materials, circuits and devices  |v 66 
588 |a Description based on online resource; title from PDF title page (IET Digital Library , viewed on March 17, 2021) 
504 |a Includes bibliographical references and index 
505 0 |a IP/IC piracy threats of reversible circuits / Samah Mohamed Saeed -- Improvements and recent updates of persistent fault analysis on block ciphers / Fan Zhang, Bolin Yang, Guorui Xu, Xiaoxuan Lou, Shivam Bhasin, Xinjie Zhao, Shize Guo, and Kui Ren -- Deployment of EMC techniques in design of IC chips for hardware security / Makoto Nagata -- Hardware obfuscation for IP protection / Abdulrahman Alaql, Md Moshiur Rahman, Tamzidul Hoque, and Swarup Bhunia -- Formal verification for SoC security / Jiaji He, Xialong Guo, Yiqiang Zhao and Yier Jin -- Silicon-based true random number generators / Yuan Cao, Egbochukwu Chukwuemeka Chidiebere, Chenkai Fang, Mingrui Zhou, Wanyi Liu Xiaojin Zhao, and Chip-Hong Chang -- Micro-architectual attacks and countermeasures on public-key implementations / Sarani Bhattacharya and Debdeep Mukhopadhyay -- Mitigating the CacheKit attack / Mauricio Gutierrez, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, and Gail-Jon Ahn -- Deep learning network security / Si Wang and Chip-Hong Chang -- Security implications of non-digital components / Xiaoxi Ren, Xhe Zhou, Di Tang, and Kehuan Zhang -- Accelerating homomorphic encryption in hardware : a review / Truong Phu Truan Ho and Chip-Hong Chang -- Information leakage from robust codes protecting cryptographic primitives / Osnat Keren and Ilia Polian -- Confidential and energy-efficient cognitive communications by physical-layer security / Pin-Hsun Lin and Eduard A. Jorswieck -- Physical-layer security for mmWave massive MIMO communications in 5G networks / Ning Wang, Long Jiao, Jie Tang, and Kai Zeng -- Security of in-vehicle controller area network : a review and future directions / Zhaojun Lu, Qian Wang, Gang Qu, and Zhenglin Liu. 
520 |a The book consists of 15 chapters dealing with the following subjects: hardware security threats; IP/IC piracy threats of reversible circuits; persistent fault analysis on block ciphers; EMC techniques in design of IC chips; hardware obfuscation for IP protection; formal verification for SoC security; silicon-based true random number generators; micro-architectural attacks and countermeasures on public-key implementations; CACHEKIT attack mitigation; deep learning network security; nondigital components; homomorphic encryption; information leakage from robust codes protecting cryptographic primitives; confidential and energy-efficient cognitive communications; physical-layer security; mm-wave massive MIMO communications in 5G networks; and in-vehicle controller area network 
590 |a Knovel  |b ACADEMIC - Computer Hardware Engineering 
590 |a Knovel  |b ACADEMIC - Software Engineering 
650 0 |a Computer security. 
650 0 |a Internet of things. 
650 0 |a Cell phone systems. 
650 0 |a Cognitive radio networks. 
650 0 |a Computer software  |x Verification. 
650 0 |a Industrial property. 
650 0 |a Integrated circuits. 
650 0 |a Machine learning. 
650 0 |a Neural networks (Computer science) 
650 2 |a Computer Security 
650 2 |a Neural Networks, Computer 
650 2 |a Machine Learning 
650 6 |a Sécurité informatique. 
650 6 |a Internet des objets. 
650 6 |a Téléphonie cellulaire. 
650 6 |a Radio cognitive. 
650 6 |a Logiciels  |x Vérification. 
650 6 |a Propriété industrielle. 
650 6 |a Circuits intégrés. 
650 6 |a Apprentissage automatique. 
650 6 |a Réseaux neuronaux (Informatique) 
650 7 |a Internet of things  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Cell phone systems  |2 fast 
650 7 |a Cognitive radio networks  |2 fast 
650 7 |a Computer software  |x Verification  |2 fast 
650 7 |a Industrial property  |2 fast 
650 7 |a Integrated circuits  |2 fast 
650 7 |a Machine learning  |2 fast 
650 7 |a Neural networks (Computer science)  |2 fast 
650 7 |a 5G mobile communication  |2 inspect 
650 7 |a cognitive radio  |2 inspect 
650 7 |a controller area networks  |2 inspect 
650 7 |a formal verification  |2 inspect 
650 7 |a industrial property  |2 inspect 
650 7 |a integrated circuits  |2 inspect 
650 7 |a learning (artificial intelligence)  |2 inspect 
650 7 |a MIMO communication  |2 inspect 
650 7 |a neural nets  |2 inspect 
650 7 |a random number generation  |2 inspect 
650 7 |a security  |2 inspect 
650 7 |a trusted computing  |2 inspect 
653 |a hardware security 
653 |a hardware trust 
653 |a IP piracy threats 
653 |a IC piracy threats 
653 |a reversible circuits 
653 |a persistent fault analysis 
653 |a block ciphers 
653 |a EMC techniques 
653 |a IC chip design 
653 |a hardware obfuscation 
653 |a IP protection 
653 |a formal verification 
653 |a SoC security 
653 |a silicon-based true random number generators 
653 |a microarchitectural attacks 
653 |a public-key cryptography 
653 |a CACHEKIT attack mitigation 
653 |a deep learning network security 
653 |a nondigital components 
653 |a homomorphic encryption 
653 |a information leakage 
653 |a robust codes 
653 |a cryptographic primitive protection 
653 |a confidential cognitive communications 
653 |a energy-efficient cognitive communications 
653 |a physical-layer security 
653 |a mm-wave massive MIMO communications 
653 |a 5G networks 
653 |a in-vehicle controller area network 
700 1 |a Chang, Chip-Hong,  |e editor. 
700 1 |a Cao, Yuan,  |e editor. 
776 0 8 |i Print version:  |t Frontiers in hardware security and trust  |d Stevenage : Institution of Engineering and Technology, 2020  |z 9781785619274  |w (OCoLC)1202844165 
830 0 |a Materials, circuits and devices series ;  |v 66. 
856 4 0 |u https://appknovel.uam.elogim.com/kn/resources/kpFHSTTDP2/toc  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37437170 
938 |a EBSCOhost  |b EBSC  |n 2698343 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6420808 
994 |a 92  |b IZTAP