|
|
|
|
LEADER |
00000cam a22000007c 4500 |
001 |
KNOVEL_on1202624304 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
201019t20202021enka ob 001 0 eng d |
040 |
|
|
|a STF
|b eng
|e rda
|e pn
|c STF
|d OCLCO
|d OCLCF
|d EBLCP
|d UKAHL
|d CUV
|d CUS
|d OCL
|d OCLCO
|d N$T
|d OCLCO
|d K6U
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 1785619284
|q electronic bk.
|
020 |
|
|
|a 9781785619281
|q (electronic bk.)
|
020 |
|
|
|z 9781785619274
|
020 |
|
|
|z 1785619276
|
029 |
1 |
|
|a AU@
|b 000068170308
|
035 |
|
|
|a (OCoLC)1202624304
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a B0100
|2 inspec
|
072 |
|
7 |
|a B2570
|2 inspec
|
072 |
|
7 |
|a B6250
|2 inspec
|
072 |
|
7 |
|a C0000
|2 inspec
|
072 |
|
7 |
|a C5290
|2 inspec
|
072 |
|
7 |
|a C5230
|2 inspec
|
072 |
|
7 |
|a C5620L
|2 inspec
|
072 |
|
7 |
|a C6130S
|2 inspec
|
072 |
|
7 |
|a C5480
|2 inspec
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Frontiers in hardware security and trust
|b theory, design and practice
|c edited by Chip Hong Chang, Yuan Cao
|
264 |
|
1 |
|a Stevenage
|b The Institution of Engineering and Technology
|c 2020
|
264 |
|
4 |
|c ©2021
|
300 |
|
|
|a 1 online resource
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Materials, circuits and devices
|v 66
|
588 |
|
|
|a Description based on online resource; title from PDF title page (IET Digital Library , viewed on March 17, 2021)
|
504 |
|
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a IP/IC piracy threats of reversible circuits / Samah Mohamed Saeed -- Improvements and recent updates of persistent fault analysis on block ciphers / Fan Zhang, Bolin Yang, Guorui Xu, Xiaoxuan Lou, Shivam Bhasin, Xinjie Zhao, Shize Guo, and Kui Ren -- Deployment of EMC techniques in design of IC chips for hardware security / Makoto Nagata -- Hardware obfuscation for IP protection / Abdulrahman Alaql, Md Moshiur Rahman, Tamzidul Hoque, and Swarup Bhunia -- Formal verification for SoC security / Jiaji He, Xialong Guo, Yiqiang Zhao and Yier Jin -- Silicon-based true random number generators / Yuan Cao, Egbochukwu Chukwuemeka Chidiebere, Chenkai Fang, Mingrui Zhou, Wanyi Liu Xiaojin Zhao, and Chip-Hong Chang -- Micro-architectual attacks and countermeasures on public-key implementations / Sarani Bhattacharya and Debdeep Mukhopadhyay -- Mitigating the CacheKit attack / Mauricio Gutierrez, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, and Gail-Jon Ahn -- Deep learning network security / Si Wang and Chip-Hong Chang -- Security implications of non-digital components / Xiaoxi Ren, Xhe Zhou, Di Tang, and Kehuan Zhang -- Accelerating homomorphic encryption in hardware : a review / Truong Phu Truan Ho and Chip-Hong Chang -- Information leakage from robust codes protecting cryptographic primitives / Osnat Keren and Ilia Polian -- Confidential and energy-efficient cognitive communications by physical-layer security / Pin-Hsun Lin and Eduard A. Jorswieck -- Physical-layer security for mmWave massive MIMO communications in 5G networks / Ning Wang, Long Jiao, Jie Tang, and Kai Zeng -- Security of in-vehicle controller area network : a review and future directions / Zhaojun Lu, Qian Wang, Gang Qu, and Zhenglin Liu.
|
520 |
|
|
|a The book consists of 15 chapters dealing with the following subjects: hardware security threats; IP/IC piracy threats of reversible circuits; persistent fault analysis on block ciphers; EMC techniques in design of IC chips; hardware obfuscation for IP protection; formal verification for SoC security; silicon-based true random number generators; micro-architectural attacks and countermeasures on public-key implementations; CACHEKIT attack mitigation; deep learning network security; nondigital components; homomorphic encryption; information leakage from robust codes protecting cryptographic primitives; confidential and energy-efficient cognitive communications; physical-layer security; mm-wave massive MIMO communications in 5G networks; and in-vehicle controller area network
|
590 |
|
|
|a Knovel
|b ACADEMIC - Computer Hardware Engineering
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Internet of things.
|
650 |
|
0 |
|a Cell phone systems.
|
650 |
|
0 |
|a Cognitive radio networks.
|
650 |
|
0 |
|a Computer software
|x Verification.
|
650 |
|
0 |
|a Industrial property.
|
650 |
|
0 |
|a Integrated circuits.
|
650 |
|
0 |
|a Machine learning.
|
650 |
|
0 |
|a Neural networks (Computer science)
|
650 |
|
2 |
|a Computer Security
|
650 |
|
2 |
|a Neural Networks, Computer
|
650 |
|
2 |
|a Machine Learning
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Internet des objets.
|
650 |
|
6 |
|a Téléphonie cellulaire.
|
650 |
|
6 |
|a Radio cognitive.
|
650 |
|
6 |
|a Logiciels
|x Vérification.
|
650 |
|
6 |
|a Propriété industrielle.
|
650 |
|
6 |
|a Circuits intégrés.
|
650 |
|
6 |
|a Apprentissage automatique.
|
650 |
|
6 |
|a Réseaux neuronaux (Informatique)
|
650 |
|
7 |
|a Internet of things
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Cell phone systems
|2 fast
|
650 |
|
7 |
|a Cognitive radio networks
|2 fast
|
650 |
|
7 |
|a Computer software
|x Verification
|2 fast
|
650 |
|
7 |
|a Industrial property
|2 fast
|
650 |
|
7 |
|a Integrated circuits
|2 fast
|
650 |
|
7 |
|a Machine learning
|2 fast
|
650 |
|
7 |
|a Neural networks (Computer science)
|2 fast
|
650 |
|
7 |
|a 5G mobile communication
|2 inspect
|
650 |
|
7 |
|a cognitive radio
|2 inspect
|
650 |
|
7 |
|a controller area networks
|2 inspect
|
650 |
|
7 |
|a formal verification
|2 inspect
|
650 |
|
7 |
|a industrial property
|2 inspect
|
650 |
|
7 |
|a integrated circuits
|2 inspect
|
650 |
|
7 |
|a learning (artificial intelligence)
|2 inspect
|
650 |
|
7 |
|a MIMO communication
|2 inspect
|
650 |
|
7 |
|a neural nets
|2 inspect
|
650 |
|
7 |
|a random number generation
|2 inspect
|
650 |
|
7 |
|a security
|2 inspect
|
650 |
|
7 |
|a trusted computing
|2 inspect
|
653 |
|
|
|a hardware security
|
653 |
|
|
|a hardware trust
|
653 |
|
|
|a IP piracy threats
|
653 |
|
|
|a IC piracy threats
|
653 |
|
|
|a reversible circuits
|
653 |
|
|
|a persistent fault analysis
|
653 |
|
|
|a block ciphers
|
653 |
|
|
|a EMC techniques
|
653 |
|
|
|a IC chip design
|
653 |
|
|
|a hardware obfuscation
|
653 |
|
|
|a IP protection
|
653 |
|
|
|a formal verification
|
653 |
|
|
|a SoC security
|
653 |
|
|
|a silicon-based true random number generators
|
653 |
|
|
|a microarchitectural attacks
|
653 |
|
|
|a public-key cryptography
|
653 |
|
|
|a CACHEKIT attack mitigation
|
653 |
|
|
|a deep learning network security
|
653 |
|
|
|a nondigital components
|
653 |
|
|
|a homomorphic encryption
|
653 |
|
|
|a information leakage
|
653 |
|
|
|a robust codes
|
653 |
|
|
|a cryptographic primitive protection
|
653 |
|
|
|a confidential cognitive communications
|
653 |
|
|
|a energy-efficient cognitive communications
|
653 |
|
|
|a physical-layer security
|
653 |
|
|
|a mm-wave massive MIMO communications
|
653 |
|
|
|a 5G networks
|
653 |
|
|
|a in-vehicle controller area network
|
700 |
1 |
|
|a Chang, Chip-Hong,
|e editor.
|
700 |
1 |
|
|a Cao, Yuan,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|t Frontiers in hardware security and trust
|d Stevenage : Institution of Engineering and Technology, 2020
|z 9781785619274
|w (OCoLC)1202844165
|
830 |
|
0 |
|a Materials, circuits and devices series ;
|v 66.
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpFHSTTDP2/toc
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37437170
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2698343
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6420808
|
994 |
|
|
|a 92
|b IZTAP
|