Search Results - "hardware security"
Suggested Topics within your search.
Suggested Topics within your search.
- Electronic Circuits and Systems 8
- Electronic circuits 8
- Electronics 5
- Electronics and Microelectronics, Instrumentation 5
- Computer architecture 4
- Microprocessors 4
- Processor Architectures 4
- Communications Engineering, Networks 3
- Computer Communication Networks 3
- Computer networks 3
- Data and Information Security 3
- Data protection 3
- Telecommunication 3
- Cryptography 2
- Cryptology 2
- Data encryption (Computer science) 2
- Security Science and Technology 2
- Security systems 2
- Signal processing 2
- Signal, Speech and Image Processing 2
- Biometric identification 1
- Biometrics 1
- Electronic digital computers 1
- Evaluation 1
- System Performance and Evaluation 1
-
1
-
2
-
3
-
4
Secure System Design and Trustable Computing
Published 2016Table of Contents: “…Part I : Hardware Security Primitives -- Disorder-Based Security Hardware: An Overview -- Design and Implementation of High-Quality Physical Unclonable Functions for Hardware-oriented Cryptography -- Digital Bimodal Functions and Digital Physical Unclonable Functions: Architecture and Applications -- Residue number systems in cryptography: design, challenges, robustness -- Fault Attacks on AES and their Countermeasures -- Hardware Counterfeiting and Integrity Protection -- Circuit Timing Signature (CTS) for Detection of Counterfeit Integrated Circuits -- Hardware Trojan Detection in Analog/RF Integrated Circuits FPGAs -- Obfuscation-based Secure SoC Design for Protection against Piracy and Trojan Attacks -- Towards Building Trusted Systems: Vulnerabilities, Threats and Mitigation Techniques -- Hardware IP Watermarking and Fingerprinting.…”
Full-text access
View in OPAC
e-Book -
5
The IoT Physical Layer Design and Implementation /
Published 2019Table of Contents: “…Systems and Security -- Self-Powered SoC Platform forWearable Health Care -- Toward An Integrated, Low-power Platform for Continuous Congestive Heart-failure Monitoring -- Hardware Security and Trust: Logic Locking as a Design-for-Trust Solution.…”
Full-text access
View in OPAC
e-Book -
6
-
7
Hardware Protection through Obfuscation
Published 2017Table of Contents: “…Part 1: Hardware Obfuscation Preliminaries -- Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation -- VLSI Test and Hardware Security Background for Hardware Obfuscation -- Part 2: Logic-based Hardware Obfuscation -- Logic Encryption -- Gate Camouflaging-based Obfuscation -- Permutation-Based Obfuscation -- Protection of Assets from Scan Chain Vulnerabilities through Obfuscation -- Part 3: Finite State Machine (FSM) Based Hardware Obfuscation -- Active Hardware Metering by Finite State Machine Obfuscation -- State Space Obfuscation and its Application in Hardware Intellectual Property Protection -- Structural Transformation-based Obfuscation -- Part 4: Hardware Obfuscation Based on Emerging Integration Approaches -- Part IV Hardware Obfuscation Based on Emerging Integration Approaches -- Split Manufacturing -- Obfuscated Built-in Self Authentication -- 3D/2.5D IC based Obfuscation -- Part 5: Other Hardware Obfuscation Building Blocks -- Obfuscation and Encryption for Securing Semiconductor Supply Chain.…”
Full-text access
View in OPAC
e-Book -
8
Computer and Network Security Essentials
Published 2018Table of Contents: “…Approximate Search in Digital Forensics -- Chapter 21.Privacy Preserving Internet Browsers - Forensic Analysis -- Part v. HARDWARE SECURITY -- Chapter 22. Experimental Digital Forensics of SubscriberIdentification Module (SIM) Card -- Chapter 23. …”
Full-text access
View in OPAC
e-Book -
9
-
10