Atjaunināt sīkdatņu piekrišanu

E-grāmata: Lightweight Hardware Security and Physically Unclonable Functions: Improving Security of Constrained IoT Devices

  • Formāts: EPUB+DRM
  • Izdošanas datums: 07-Jan-2025
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031763281
  • Formāts - EPUB+DRM
  • Cena: 107,06 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Izdošanas datums: 07-Jan-2025
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031763281

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs. The authors provide a comprehensive study of the various approaches that are used to mitigate PUFs’ shortcomings, while at the same time highlighting those that are most efficient. Coverage also includes state-of-the-art approaches to designing PUFs with high resilience to machine learning attacks and hardware implementation of area-efficient and high performing PUF architectures. The authors also classify different IoT applications and devices, depending on their security needs and limitations, offering a new perspective on how different PUF designs fit in the overall scope of IoT security.

Chapter 1 Introduction and Background.
Chapter 2 Exploring Classic
Security Attacks and Hardware Intricacies.
Chapter 3 Hardware Security
Challenges.
Chapter 4 Security in Resource-Constrained IoT Devices.
Chapter
5 Physically Unclonable Functions.
Chapter 6 PUF: Security Threats.
Chapter
7 PUF Performance Testing and Evaluation.
Chapter 8 Improving the PUFs
Reliability.
Chapter 9 The Right Fit to your Device and Application.-
Chapter 10 Advanced PUF designs.
Chapter 11 Lightweight PUF Protocols.
Dr. Kasem Khalil is an assistant professor in the Department of Electrical and Computer Engineering, University of Mississippi.





Haytham Idriss is an Assistant Professor in the Department of Computer Science, at the Purdue University Fort Wayne.





Tarek Idriss is an Associate Professor in the Department of Computer Science, at Western Washington University.





Dr. Magdy A. Bayoumi is Director of The Center for Advanced Computer Studies (CACS), and Department Head of the Computer Science Department at the University of Louisiana at Lafayette (UL Lafayette). He is also the Z.L. Loflin Eminent Scholar Endowed Chair Professor in Computer Science.