Introduction to Hardware Security and Trust (Record no. 100553)

000 -LEADER
fixed length control field 03656nam a22004695i 4500
001 - CONTROL NUMBER
control field 978-1-4419-8080-9
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140220083233.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110920s2012 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781441980809
-- 978-1-4419-8080-9
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-1-4419-8080-9
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK7888.4
072 #7 - SUBJECT CATEGORY CODE
Subject category code TJFC
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code TEC008010
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.3815
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Tehranipoor, Mohammad.
Relator term editor.
245 10 - TITLE STATEMENT
Title Introduction to Hardware Security and Trust
Medium [electronic resource] /
Statement of responsibility, etc edited by Mohammad Tehranipoor, Cliff Wang.
264 #1 -
-- New York, NY :
-- Springer New York,
-- 2012.
300 ## - PHYSICAL DESCRIPTION
Extent VIII, 427 p. 174 illus.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Background on VLSI Testing -- 2. Hardware Implementation of Hash Functions -- 3. RSA: Implementation and Security -- 4. Security based on Physical Unclonability and Disorder -- 5. Hardware Metering: A Survey -- 6. Secure Hardware IPs by Digital Watermark -- 7. Physical Attacks and Tamper Resistance.-8. Side Channel Attacks and Countermeasures -- 9. Trusted Design in FPGAs -- 10. Security in Embedded Systems -- 11. Side-channel Attacks and Countermeasures for Embedded Microcontrollers -- 12. Security for RFID Tags -- 13. Memory Integrity Protection -- 14. Trojan Taxonomy -- 15. Hardware Trojan Detection.-16. Design for Hardware Trust -- 17. Security and Testing -- 18. Protecting IPs Against Scan-Based Side-Channel Attacks.
520 ## - SUMMARY, ETC.
Summary, etc The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip. This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society’s microelectronic-supported infrastructures. Provides a comprehensive introduction to hardware security and trust; Includes coverage at the circuit and systems levels, with applications to design and implementation; Describes a variety of state-of-the-art applications, such as physically unclonable functions, unclonable RFID tags and attack and countermeasures for smart cards.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronics.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Systems engineering.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Circuits and Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronics and Microelectronics, Instrumentation.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Processor Architectures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wang, Cliff.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9781441980793
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4419-8080-9
912 ## -
-- ZDB-2-ENG

No items available.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue