Secure and Trustworthy Cyberphysical Microfluidic Biochips (Record no. 76708)

000 -LEADER
fixed length control field 03605nam a22005655i 4500
001 - CONTROL NUMBER
control field 978-3-030-18163-5
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801214741.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190528s2020 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783030181635
-- 978-3-030-18163-5
082 04 - CLASSIFICATION NUMBER
Call Number 621.3815
100 1# - AUTHOR NAME
Author Tang, Jack.
245 10 - TITLE STATEMENT
Title Secure and Trustworthy Cyberphysical Microfluidic Biochips
Sub Title A practical guide to cutting-edge design techniques for implementing secure and trustworthy cyberphysical microfluidic biochips /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2020.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XIV, 144 p. 51 illus., 42 illus. in color.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Chapter 1. Cyberphysical Microfluidic Biochips -- Chapter 2. Security and Trust -- Chapter 3. Prevention: Tamper-Resistant Pin-Constrained Digital Microfluidic Biochips -- Chapter 4. Detection: Randomizing Checkpoints on Cyberphysical Digital Microfluidic Biochips -- Chapter 5. Mitigation: Tamper-Mitigating Routing Fabrics -- Chapter 6. Conclusions.
520 ## - SUMMARY, ETC.
Summary, etc This book describes novel hardware security and microfluidic biochip design methodologies to protect against tampering attacks in cyberphysical microfluidic biochips (CPMBs). It also provides a general overview of this nascent area of research, which will prove to be a vital resource for practitioners in the field.This book shows how hardware-based countermeasures and design innovations can be a simple and effective last line of defense, demonstrating that it is no longer justifiable to ignore security and trust in the design phase of biochips. Provides a high-level overview of emerging security threats facing cyberphysical microfluidic biochips Discusses hardware design for the prevention of tampering attacks on DMFBs Describes techniques for detection of tampering attacks on DMFBs Presents methodology for hardware-based mitigation of tampering attacks on flow-based routing fabrics.
700 1# - AUTHOR 2
Author 2 Ibrahim, Mohamed.
700 1# - AUTHOR 2
Author 2 Chakrabarty, Krishnendu.
700 1# - AUTHOR 2
Author 2 Karri, Ramesh.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-030-18163-5
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2020.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic circuits.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Biomedical engineering.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Microprocessors.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer architecture.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic Circuits and Systems.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Biomedical Engineering and Bioengineering.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Processor Architectures.
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.