LEADER 00000cam a22013577c 4500 001 on1202624304 003 OCoLC 005 20220114043859.0 006 m o d 007 cr cn||||||||| 008 201019t20202021enka ob 001 0 eng d 020 1785619284|qelectronic book 020 9781785619281|q(electronic book) 020 |z9781785619274 020 |z1785619276 035 (OCoLC)1202624304 040 STF|beng|erda|epn|cSTF|dOCLCO|dOCLCF|dEBLCP|dUKAHL|dCUV |dCUS|dOCL|dOCLCO|dN$T 049 RIDW 050 4 QA76.9.A25 072 7 B0100|2inspec 072 7 B2570|2inspec 072 7 B6250|2inspec 072 7 C0000|2inspec 072 7 C5290|2inspec 072 7 C5230|2inspec 072 7 C5620L|2inspec 072 7 C6130S|2inspec 072 7 C5480|2inspec 082 04 005.8 090 QA76.9.A25 245 00 Frontiers in hardware security and trust|btheory, design and practice /|cedited by Chip Hong Chang, Yuan Cao. 264 1 Stevenage|bThe Institution of Engineering and Technology |c2020. 264 4 |c©2021 300 1 online resource :|billustrations. 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 340 |gpolychrome|2rdacc 347 text file|2rdaft 490 1 Materials, circuits and devices ;|v66 504 Includes bibliographical references and index. 505 0 IP/IC piracy threats of reversible circuits / Samah Mohamed Saeed -- Improvements and recent updates of persistent fault analysis on block ciphers / Fan Zhang, Bolin Yang, Guorui Xu, Xiaoxuan Lou, Shivam Bhasin, Xinjie Zhao, Shize Guo, and Kui Ren -- Deployment of EMC techniques in design of IC chips for hardware security / Makoto Nagata -- Hardware obfuscation for IP protection / Abdulrahman Alaql, Md Moshiur Rahman, Tamzidul Hoque, and Swarup Bhunia -- Formal verification for SoC security / Jiaji He, Xialong Guo, Yiqiang Zhao and Yier Jin -- Silicon-based true random number generators / Yuan Cao, Egbochukwu Chukwuemeka Chidiebere, Chenkai Fang, Mingrui Zhou, Wanyi Liu Xiaojin Zhao, and Chip-Hong Chang -- Micro -architectual attacks and countermeasures on public-key implementations / Sarani Bhattacharya and Debdeep Mukhopadhyay -- Mitigating the CacheKit attack / Mauricio Gutierrez, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, and Gail-Jon Ahn -- Deep learning network security / Si Wang and Chip-Hong Chang -- Security implications of non- digital components / Xiaoxi Ren, Xhe Zhou, Di Tang, and Kehuan Zhang -- Accelerating homomorphic encryption in hardware : a review / Truong Phu Truan Ho and Chip-Hong Chang -- Information leakage from robust codes protecting cryptographic primitives / Osnat Keren and Ilia Polian -- Confidential and energy-efficient cognitive communications by physical-layer security / Pin-Hsun Lin and Eduard A. Jorswieck -- Physical-layer security for mmWave massive MIMO communications in 5G networks / Ning Wang, Long Jiao, Jie Tang, and Kai Zeng -- Security of in-vehicle controller area network : a review and future directions / Zhaojun Lu, Qian Wang, Gang Qu, and Zhenglin Liu. 520 The book consists of 15 chapters dealing with the following subjects: hardware security threats; IP/IC piracy threats of reversible circuits; persistent fault analysis on block ciphers; EMC techniques in design of IC chips; hardware obfuscation for IP protection; formal verification for SoC security; silicon-based true random number generators; micro-architectural attacks and countermeasures on public-key implementations; CACHEKIT attack mitigation; deep learning network security; nondigital components; homomorphic encryption; information leakage from robust codes protecting cryptographic primitives; confidential and energy-efficient cognitive communications; physical-layer security; mm-wave massive MIMO communications in 5G networks; and in-vehicle controller area network 588 Description based on online resource; title from PDF title page (IET Digital Library , viewed on March 17, 2021) 590 eBooks on EBSCOhost|bEBSCO eBook Subscription Academic Collection - North America 650 0 Computer security.|0https://id.loc.gov/authorities/ subjects/sh90001862 650 0 Internet of things.|0https://id.loc.gov/authorities/ subjects/sh2013000266 650 0 Cell phone systems.|0https://id.loc.gov/authorities/ subjects/sh98004793 650 0 Cognitive radio networks.|0https://id.loc.gov/authorities/ subjects/sh2008002568 650 0 Computer software|xVerification.|0https://id.loc.gov/ authorities/subjects/sh85029537 650 0 Industrial property.|0https://id.loc.gov/authorities/ subjects/sh85065922 650 0 Integrated circuits.|0https://id.loc.gov/authorities/ subjects/sh85067117 650 0 Machine learning.|0https://id.loc.gov/authorities/subjects /sh85079324 650 0 Neural networks (Computer science)|0https://id.loc.gov/ authorities/subjects/sh90001937 650 7 Computer security.|2fast|0https://id.worldcat.org/fast/ 872484 650 7 Internet of things.|2fast|0https://id.worldcat.org/fast/ 1894151 650 7 Cell phone systems.|2fast|0https://id.worldcat.org/fast/ 1734555 650 7 Cognitive radio networks.|2fast|0https://id.worldcat.org/ fast/1745359 650 7 Computer software|xVerification.|2fast|0https:// id.worldcat.org/fast/872604 650 7 Industrial property.|2fast|0https://id.worldcat.org/fast/ 971584 650 7 Integrated circuits.|2fast|0https://id.worldcat.org/fast/ 975535 650 7 Machine learning.|2fast|0https://id.worldcat.org/fast/ 1004795 650 7 Neural networks (Computer science)|2fast|0https:// id.worldcat.org/fast/1036260 650 7 5G mobile communication.|2inspect 650 7 cognitive radio.|2inspect 650 7 controller area networks.|2inspect 650 7 formal verification.|2inspect 650 7 industrial property.|2inspect 650 7 integrated circuits.|2inspect 650 7 learning (artificial intelligence)|2inspect 650 7 MIMO communication.|2inspect 650 7 neural nets.|2inspect 650 7 random number generation.|2inspect 650 7 security.|2inspect 650 7 trusted computing.|2inspect 653 hardware security 653 hardware trust 653 IP piracy threats 653 IC piracy threats 653 reversible circuits 653 persistent fault analysis 653 block ciphers 653 EMC techniques 653 IC chip design 653 hardware obfuscation 653 IP protection 653 formal verification 653 SoC security 653 silicon-based true random number generators 653 microarchitectural attacks 653 public-key cryptography 653 CACHEKIT attack mitigation 653 deep learning network security 653 nondigital components 653 homomorphic encryption 653 information leakage 653 robust codes 653 cryptographic primitive protection 653 confidential cognitive communications 653 energy-efficient cognitive communications 653 physical-layer security 653 mm-wave massive MIMO communications 653 5G networks 653 in-vehicle controller area network 655 4 Electronic books. 700 1 Chang, Chip-Hong,|0https://id.loc.gov/authorities/names/ nb2005018142|eeditor. 700 1 Cao, Yuan|c(College teacher),|0https://id.loc.gov/ authorities/names/nb2020009960|eeditor. 776 08 |iPrint version:|tFrontiers in hardware security and trust |dStevenage : Institution of Engineering and Technology, 2020|z9781785619274|w(OCoLC)1202844165 830 0 Materials, circuits and devices series ;|0https:// id.loc.gov/authorities/names/no2016019132|v66. 856 40 |uhttps://rider.idm.oclc.org/login?url=https:// search.ebscohost.com/login.aspx?direct=true&scope=site& db=nlebk&AN=2698343|zOnline ebook via EBSCO. Access restricted to current Rider University students, faculty, and staff. 856 42 |3Instructions for reading/downloading the EBSCO version of this ebook|uhttp://guides.rider.edu/ebooks/ebsco 901 MARCIVE 20231220 948 |d20220127|cEBSCO|tEBSCOebooksacademic NEW 6019|lridw 994 92|bRID