Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Authentication of embedded devices =...
~
Halak, Basel.
Linked to FindBook
Google Book
Amazon
博客來
Authentication of embedded devices = technologies, protocols and emerging applications /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Authentication of embedded devices/ edited by Basel Halak.
Reminder of title:
technologies, protocols and emerging applications /
other author:
Halak, Basel.
Published:
Cham :Springer International Publishing : : 2021.,
Description:
xv, 188 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Introduction -- Integrated Circuit Fingerprinting -- Novel PUF designs for device Identification -- Authentication Protocols: Standards, limitation and research opportunities -- Hardware-based Authentication Protocols for better physical security -- Energy Efficient Authentication Protocols -- Case study 1: Securing Hardware Supply Chain -- Case study 2: GPS spoofing attack detection and survival.
Contained By:
Springer Nature eBook
Subject:
Integrated circuits - Verification. -
Online resource:
https://doi.org/10.1007/978-3-030-60769-2
ISBN:
9783030607692
Authentication of embedded devices = technologies, protocols and emerging applications /
Authentication of embedded devices
technologies, protocols and emerging applications /[electronic resource] :edited by Basel Halak. - Cham :Springer International Publishing :2021. - xv, 188 p. :ill. (some col.), digital ;24 cm.
Introduction -- Integrated Circuit Fingerprinting -- Novel PUF designs for device Identification -- Authentication Protocols: Standards, limitation and research opportunities -- Hardware-based Authentication Protocols for better physical security -- Energy Efficient Authentication Protocols -- Case study 1: Securing Hardware Supply Chain -- Case study 2: GPS spoofing attack detection and survival.
This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications. The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival. Provides deep insight into the security threats undermining existing integrated circuit authentication techniques; Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems; Offers a comprehensive summary of existing authentication protocols and their limitations; Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption; Includes detailed case studies on the emerging applications of IC authentication schemes.
ISBN: 9783030607692
Standard No.: 10.1007/978-3-030-60769-2doiSubjects--Topical Terms:
827163
Integrated circuits
--Verification.
LC Class. No.: TK7874.58 / .A984 2021
Dewey Class. No.: 621.3815
Authentication of embedded devices = technologies, protocols and emerging applications /
LDR
:02859nmm a2200325 a 4500
001
2237527
003
DE-He213
005
20210628134705.0
006
m d
007
cr nn 008maaau
008
211111s2021 sz s 0 eng d
020
$a
9783030607692
$q
(electronic bk.)
020
$a
9783030607685
$q
(paper)
024
7
$a
10.1007/978-3-030-60769-2
$2
doi
035
$a
978-3-030-60769-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK7874.58
$b
.A984 2021
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
621.3815
$2
23
090
$a
TK7874.58
$b
.A939 2021
245
0 0
$a
Authentication of embedded devices
$h
[electronic resource] :
$b
technologies, protocols and emerging applications /
$c
edited by Basel Halak.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xv, 188 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
Introduction -- Integrated Circuit Fingerprinting -- Novel PUF designs for device Identification -- Authentication Protocols: Standards, limitation and research opportunities -- Hardware-based Authentication Protocols for better physical security -- Energy Efficient Authentication Protocols -- Case study 1: Securing Hardware Supply Chain -- Case study 2: GPS spoofing attack detection and survival.
520
$a
This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications. The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival. Provides deep insight into the security threats undermining existing integrated circuit authentication techniques; Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems; Offers a comprehensive summary of existing authentication protocols and their limitations; Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption; Includes detailed case studies on the emerging applications of IC authentication schemes.
650
0
$a
Integrated circuits
$x
Verification.
$3
827163
650
0
$a
Embedded computer systems.
$3
582088
650
0
$a
Electronic circuits.
$3
528097
650
0
$a
Computer engineering.
$3
621879
650
0
$a
Internet of things.
$3
2057703
650
0
$a
Microprocessors.
$3
517143
650
1 4
$a
Circuits and Systems.
$3
896527
650
2 4
$a
Cyber-physical systems, IoT.
$3
3386699
650
2 4
$a
Processor Architectures.
$3
892680
700
1
$a
Halak, Basel.
$3
3321500
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-030-60769-2
950
$a
Engineering (SpringerNature-11647)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9399412
電子資源
11.線上閱覽_V
電子書
EB TK7874.58 .A984 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login