Description |
1 online resource : illustrations. |
Physical Medium |
polychrome |
Description |
text file |
Series |
Materials, circuits and devices ; 66
|
|
Materials, circuits and devices series ; 66.
|
Bibliography |
Includes bibliographical references and index. |
Contents |
IP/IC piracy threats of reversible circuits / Samah Mohamed Saeed -- Improvements and recent updates of persistent fault analysis on block ciphers / Fan Zhang, Bolin Yang, Guorui Xu, Xiaoxuan Lou, Shivam Bhasin, Xinjie Zhao, Shize Guo, and Kui Ren -- Deployment of EMC techniques in design of IC chips for hardware security / Makoto Nagata -- Hardware obfuscation for IP protection / Abdulrahman Alaql, Md Moshiur Rahman, Tamzidul Hoque, and Swarup Bhunia -- Formal verification for SoC security / Jiaji He, Xialong Guo, Yiqiang Zhao and Yier Jin -- Silicon-based true random number generators / Yuan Cao, Egbochukwu Chukwuemeka Chidiebere, Chenkai Fang, Mingrui Zhou, Wanyi Liu Xiaojin Zhao, and Chip-Hong Chang -- Micro-architectual attacks and countermeasures on public-key implementations / Sarani Bhattacharya and Debdeep Mukhopadhyay -- Mitigating the CacheKit attack / Mauricio Gutierrez, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, and Gail-Jon Ahn -- Deep learning network security / Si Wang and Chip-Hong Chang -- Security implications of non-digital components / Xiaoxi Ren, Xhe Zhou, Di Tang, and Kehuan Zhang -- Accelerating homomorphic encryption in hardware : a review / Truong Phu Truan Ho and Chip-Hong Chang -- Information leakage from robust codes protecting cryptographic primitives / Osnat Keren and Ilia Polian -- Confidential and energy-efficient cognitive communications by physical-layer security / Pin-Hsun Lin and Eduard A. Jorswieck -- Physical-layer security for mmWave massive MIMO communications in 5G networks / Ning Wang, Long Jiao, Jie Tang, and Kai Zeng -- Security of in-vehicle controller area network : a review and future directions / Zhaojun Lu, Qian Wang, Gang Qu, and Zhenglin Liu. |
Summary |
The book consists of 15 chapters dealing with the following subjects: hardware security threats; IP/IC piracy threats of reversible circuits; persistent fault analysis on block ciphers; EMC techniques in design of IC chips; hardware obfuscation for IP protection; formal verification for SoC security; silicon-based true random number generators; micro-architectural attacks and countermeasures on public-key implementations; CACHEKIT attack mitigation; deep learning network security; nondigital components; homomorphic encryption; information leakage from robust codes protecting cryptographic primitives; confidential and energy-efficient cognitive communications; physical-layer security; mm-wave massive MIMO communications in 5G networks; and in-vehicle controller area network |
Local Note |
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America |
Subject |
Computer security.
|
|
Computer security. |
|
Internet of things.
|
|
Internet of things. |
|
Cell phone systems.
|
|
Cell phone systems. |
|
Cognitive radio networks.
|
|
Cognitive radio networks. |
|
Computer software -- Verification.
|
|
Computer software -- Verification. |
|
Industrial property.
|
|
Industrial property. |
|
Integrated circuits.
|
|
Integrated circuits. |
|
Machine learning.
|
|
Machine learning. |
|
Neural networks (Computer science)
|
|
Neural networks (Computer science) |
|
5G mobile communication. |
|
cognitive radio. |
|
controller area networks. |
|
formal verification. |
|
industrial property. |
|
integrated circuits. |
|
learning (artificial intelligence) |
|
MIMO communication. |
|
neural nets. |
|
random number generation. |
|
security. |
|
trusted computing. |
Indexed Term |
hardware security |
|
hardware trust |
|
IP piracy threats |
|
IC piracy threats |
|
reversible circuits |
|
persistent fault analysis |
|
block ciphers |
|
EMC techniques |
|
IC chip design |
|
hardware obfuscation |
|
IP protection |
|
formal verification |
|
SoC security |
|
silicon-based true random number generators |
|
microarchitectural attacks |
|
public-key cryptography |
|
CACHEKIT attack mitigation |
|
deep learning network security |
|
nondigital components |
|
homomorphic encryption |
|
information leakage |
|
robust codes |
|
cryptographic primitive protection |
|
confidential cognitive communications |
|
energy-efficient cognitive communications |
|
physical-layer security |
|
mm-wave massive MIMO communications |
|
5G networks |
|
in-vehicle controller area network |
Genre/Form |
Electronic books.
|
Added Author |
Chang, Chip-Hong, editor.
|
|
Cao, Yuan (College teacher), editor.
|
Other Form: |
Print version: Frontiers in hardware security and trust Stevenage : Institution of Engineering and Technology, 2020 9781785619274 (OCoLC)1202844165 |
ISBN |
1785619284 electronic book |
|
9781785619281 (electronic book) |
|
9781785619274 |
|
1785619276 |
|