000 | 03514nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-030-64448-2 | ||
003 | DE-He213 | ||
005 | 20220801220325.0 | ||
007 | cr nn 008mamaa | ||
008 | 210430s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030644482 _9978-3-030-64448-2 |
||
024 | 7 |
_a10.1007/978-3-030-64448-2 _2doi |
|
050 | 4 | _aTK7867-7867.5 | |
072 | 7 |
_aTJFC _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aTJFC _2thema |
|
082 | 0 | 4 |
_a621.3815 _223 |
245 | 1 | 0 |
_aEmerging Topics in Hardware Security _h[electronic resource] / _cedited by Mark Tehranipoor. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXXVIII, 602 p. 217 illus., 170 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Blockchain for Supply Chain Integrity -- Backside is a new Backdoor -- Post-quantum HW Security -- Microfluidic device security -- ML in HW Security -- Digital Twin -- HLS Security Assessment -- CAD for SCA: SCRIPT -- Analog Obfuscation -- CAD for Physical Assurance -- Neuromorphic Security -- Post quantum Crypto Hardware -- Trillion Sensors Security -- Homomorphic Encryption -- Software Security with HW in Mind -- Security of Emerging Memories -- Firmware Obfuscation -- Computer Vision in HW Security. | |
520 | _aThis book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains. The authors are experts in emerging technologies, traditional hardware design, and hardware security and trust. Readers will gain a comprehensive understanding of hardware security problems and how to overcome them through an efficient combination of conventional approaches and emerging technologies, enabling them to design secure, reliable, and trustworthy hardware. Offers a high-level introduction to current hardware security problems; Provides a thorough discussion of a wide variety of emerging topics and technologies (e.g., artificial intelligence, blockchain, and quantum computing) and their applications to hardware security problems; Covers state-of-the-art techniques, as well as ongoing research efforts in emerging technologies in hardware security; Provides guidance and techniques to design and security engineers on protecting their design using emerging technologies. | ||
650 | 0 |
_aElectronic circuits. _919581 |
|
650 | 0 |
_aInternet of things. _94027 |
|
650 | 0 |
_aMicroprocessors. _949642 |
|
650 | 0 |
_aComputer architecture. _93513 |
|
650 | 1 | 4 |
_aElectronic Circuits and Systems. _949643 |
650 | 2 | 4 |
_aInternet of Things. _94027 |
650 | 2 | 4 |
_aProcessor Architectures. _949644 |
700 | 1 |
_aTehranipoor, Mark. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _949645 |
|
710 | 2 |
_aSpringerLink (Online service) _949646 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030644475 |
776 | 0 | 8 |
_iPrinted edition: _z9783030644499 |
776 | 0 | 8 |
_iPrinted edition: _z9783030644505 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-64448-2 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c78444 _d78444 |