Foundations of Hardware IP Protection (Record no. 80218)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03667nam a22005415i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-50380-6 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220801221931.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 170110s2017 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319503806 |
-- | 978-3-319-50380-6 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 621.3815 |
245 10 - TITLE STATEMENT | |
Title | Foundations of Hardware IP Protection |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2017. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | VII, 240 p. 125 illus., 48 illus. in color. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Digital Right Management for IP Protection -- Turning Electronic Circuits Features into On-Chip Locks -- Logic Modification-Based IP Protection Methods: An Overview and a Proposal -- IP FSM Watermarking -- Side Channel Analysis, an Efficient Ally for IP Protection -- Hardware Obfuscation -- An application of Partial Hardware Reverse Engineering for the Detection of Hardware Trojan -- Linear Complementary Codes: Novel Hardware Trojan Prevention and Detection Approach -- Ultra-Lightweight Implementation in Area of Block Ciphers -- Enhancing Secure Elements – Technology and Architecture. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection. · Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP; · Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security; · Introduce designers to the concept of salutary hardware, difficult to circumvent embedded hardware security systems. |
700 1# - AUTHOR 2 | |
Author 2 | Bossuet, Lilian. |
700 1# - AUTHOR 2 | |
Author 2 | Torres, Lionel. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-319-50380-6 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2017. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronic circuits. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Microprocessors. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer architecture. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronics. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronic Circuits and Systems. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Processor Architectures. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronics and Microelectronics, Instrumentation. |
912 ## - | |
-- | ZDB-2-ENG |
912 ## - | |
-- | ZDB-2-SXE |
No items available.