Secure System Design and Trustable Computing (Record no. 55569)

000 -LEADER
fixed length control field 03075nam a22004935i 4500
001 - CONTROL NUMBER
control field 978-3-319-14971-4
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421111841.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150917s2016 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319149714
-- 978-3-319-14971-4
082 04 - CLASSIFICATION NUMBER
Call Number 621.3815
245 10 - TITLE STATEMENT
Title Secure System Design and Trustable Computing
300 ## - PHYSICAL DESCRIPTION
Number of Pages XII, 537 p. 202 illus., 96 illus. in color.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Part I : Hardware Security Primitives -- Disorder-Based Security Hardware: An Overview -- Design and Implementation of High-Quality Physical Unclonable Functions for Hardware-oriented Cryptography -- Digital Bimodal Functions and Digital Physical Unclonable Functions: Architecture and Applications -- Residue number systems in cryptography: design, challenges, robustness -- Fault Attacks on AES and their Countermeasures -- Hardware Counterfeiting and Integrity Protection -- Circuit Timing Signature (CTS) for Detection of Counterfeit Integrated Circuits -- Hardware Trojan Detection in Analog/RF Integrated Circuits FPGAs -- Obfuscation-based Secure SoC Design for Protection against Piracy and Trojan Attacks -- Towards Building Trusted Systems: Vulnerabilities, Threats and Mitigation Techniques -- Hardware IP Watermarking and Fingerprinting.
520 ## - SUMMARY, ETC.
Summary, etc This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions, and networking services.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society's microelectronic-supported infrastructures.
700 1# - AUTHOR 2
Author 2 Chang, Chip-Hong.
700 1# - AUTHOR 2
Author 2 Potkonjak, Miodrag.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-319-14971-4
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2016.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Engineering.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronics.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Microelectronics.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic circuits.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Engineering.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Circuits and Systems.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronics and Microelectronics, Instrumentation.
912 ## -
-- ZDB-2-ENG

No items available.