Using Imperfect Semiconductor Systems for Unique Identification

Nonfiction, Science & Nature, Technology, Electronics, Semiconductors, Engineering
Cover of the book Using Imperfect Semiconductor Systems for Unique Identification by Jonathan Roberts, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jonathan Roberts ISBN: 9783319678917
Publisher: Springer International Publishing Publication: September 14, 2017
Imprint: Springer Language: English
Author: Jonathan Roberts
ISBN: 9783319678917
Publisher: Springer International Publishing
Publication: September 14, 2017
Imprint: Springer
Language: English

This thesis describes novel devices for the secure identification of objects or electronic systems. The identification relies on the the atomic-scale uniqueness of semiconductor devices by measuring a macroscopic quantum property of the system in question. Traditionally, objects and electronic systems have been securely identified by measuring specific characteristics: common examples include passwords, fingerprints used to identify a person or an electronic device, and holograms that can tag a given object to prove its authenticity. Unfortunately, modern technologies also make it possible to circumvent these everyday techniques.

Variations in quantum properties are amplified by the existence of atomic-scale imperfections. As such, these devices are the hardest possible systems to clone. They also use the least resources and provide robust security. Hence they have tremendous potential significance as a means of reliably telling the good guys from the bad.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This thesis describes novel devices for the secure identification of objects or electronic systems. The identification relies on the the atomic-scale uniqueness of semiconductor devices by measuring a macroscopic quantum property of the system in question. Traditionally, objects and electronic systems have been securely identified by measuring specific characteristics: common examples include passwords, fingerprints used to identify a person or an electronic device, and holograms that can tag a given object to prove its authenticity. Unfortunately, modern technologies also make it possible to circumvent these everyday techniques.

Variations in quantum properties are amplified by the existence of atomic-scale imperfections. As such, these devices are the hardest possible systems to clone. They also use the least resources and provide robust security. Hence they have tremendous potential significance as a means of reliably telling the good guys from the bad.

More books from Springer International Publishing

Cover of the book In the Aftermath of Gezi by Jonathan Roberts
Cover of the book Advances in Social and Occupational Ergonomics by Jonathan Roberts
Cover of the book Radon: A Tracer for Geological, Geophysical and Geochemical Studies by Jonathan Roberts
Cover of the book Financial Crisis, Bank Behaviour and Credit Crunch by Jonathan Roberts
Cover of the book Protein Folding by Jonathan Roberts
Cover of the book The Bethesda System for Reporting Thyroid Cytopathology by Jonathan Roberts
Cover of the book A Clinician's Guide to Integrative Oncology by Jonathan Roberts
Cover of the book Descriptional Complexity of Formal Systems by Jonathan Roberts
Cover of the book Information Modelling for Archaeology and Anthropology by Jonathan Roberts
Cover of the book Newtonian Microeconomics by Jonathan Roberts
Cover of the book Phenomenology of Space and Time by Jonathan Roberts
Cover of the book Embedded Operating Systems by Jonathan Roberts
Cover of the book Power Amplifiers for the S-, C-, X- and Ku-bands by Jonathan Roberts
Cover of the book Consociationalism and Power-Sharing in Europe by Jonathan Roberts
Cover of the book The Transitions of Aging by Jonathan Roberts
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy