Foundations of Hardware IP Protection

Nonfiction, Science & Nature, Technology, Electronics, Circuits, Computers, Advanced Computing, Engineering, Computer Architecture
Cover of the book Foundations of Hardware IP Protection by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319503806
Publisher: Springer International Publishing Publication: January 10, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319503806
Publisher: Springer International Publishing
Publication: January 10, 2017
Imprint: Springer
Language: English

This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection.

More books from Springer International Publishing

Cover of the book Muslims, Schooling and Security by
Cover of the book Pediatric Demyelinating Diseases of the Central Nervous System and Their Mimics by
Cover of the book Advanced Information Systems Engineering Workshops by
Cover of the book Understanding Kidney Diseases by
Cover of the book Melanoma by
Cover of the book Evaluation of Novel Approaches to Software Engineering by
Cover of the book Elliptic Curves, Modular Forms and Iwasawa Theory by
Cover of the book Pragmatics and Philosophy. Connections and Ramifications by
Cover of the book The Emergence of Israeli-Greek Cooperation by
Cover of the book Graphical Simulation of Deformable Models by
Cover of the book Saramago’s Philosophical Heritage by
Cover of the book Cognitive Technologies by
Cover of the book Design, User Experience, and Usability. Practice and Case Studies by
Cover of the book Human-Experiential Design of Presence in Everyday Blended Reality by
Cover of the book Information Security and Cryptology - ICISC 2015 by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy