Secure system design and trustable computing:
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
[2016]
|
Schlagworte: | |
Online-Zugang: | BTU01 FAB01 FAW01 FHA01 FHI01 FHN01 FHR01 FKE01 FRO01 FWS01 FWS02 UBY01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online Ressource (xii, 537 p. 202 illus., 96 illus. in color) |
ISBN: | 9783319149714 |
DOI: | 10.1007/978-3-319-14971-4 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043210842 | ||
003 | DE-604 | ||
005 | 20160617 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2016 |||| o||u| ||||||eng d | ||
020 | |a 9783319149714 |c Online |9 978-3-319-14971-4 | ||
024 | 7 | |a 10.1007/978-3-319-14971-4 |2 doi | |
035 | |a (OCoLC)923665374 | ||
035 | |a (DE-599)BVBBV043210842 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1043 |a DE-Aug4 |a DE-573 |a DE-859 |a DE-863 |a DE-92 |a DE-862 |a DE-898 |a DE-634 |a DE-1046 |a DE-861 |a DE-706 | ||
082 | 0 | |a 621.3815 |2 23 | |
245 | 1 | 0 | |a Secure system design and trustable computing |c Chip-Hong Chang, Miodrag Potkonjak editors |
264 | 1 | |a Cham |b Springer International Publishing |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online Ressource (xii, 537 p. 202 illus., 96 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Engineering | |
650 | 4 | |a Computer security | |
650 | 4 | |a Electronics | |
650 | 4 | |a Microelectronics | |
650 | 4 | |a Electronic circuits | |
650 | 4 | |a Circuits and Systems | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Electronics and Microelectronics, Instrumentation | |
650 | 4 | |a Ingenieurwissenschaften | |
700 | 1 | |a Chang, Chip-Hong |4 edt | |
700 | 1 | |a Potkonjak, Miodrag |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-14970-7 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-14971-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633985&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633985&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028633985 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-14971-4 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14971-4 |l FAB01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14971-4 |l FAW01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14971-4 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14971-4 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14971-4 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14971-4 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14971-4 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14971-4 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14971-4 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14971-4 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14971-4 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 589997 |
---|---|
_version_ | 1806179621234802688 |
adam_text | SECURE SYSTEM DESIGN AND TRUSTABLE COMPUTING
/
: 2016
TABLE OF CONTENTS / INHALTSVERZEICHNIS
PART I : HARDWARE SECURITY PRIMITIVES
DISORDER-BASED SECURITY HARDWARE: AN OVERVIEW
DESIGN AND IMPLEMENTATION OF HIGH-QUALITY PHYSICAL UNCLONABLE FUNCTIONS
FOR HARDWARE-ORIENTED CRYPTOGRAPHY
DIGITAL BIMODAL FUNCTIONS AND DIGITAL PHYSICAL UNCLONABLE FUNCTIONS:
ARCHITECTURE AND APPLICATIONS
RESIDUE NUMBER SYSTEMS IN CRYPTOGRAPHY: DESIGN, CHALLENGES, ROBUSTNESS
FAULT ATTACKS ON AES AND THEIR COUNTERMEASURES
HARDWARE COUNTERFEITING AND INTEGRITY PROTECTION
CIRCUIT TIMING SIGNATURE (CTS) FOR DETECTION OF COUNTERFEIT INTEGRATED
CIRCUITS
HARDWARE TROJAN DETECTION IN ANALOG/RF INTEGRATED CIRCUITS FPGAS
OBFUSCATION-BASED SECURE SOC DESIGN FOR PROTECTION AGAINST PIRACY AND
TROJAN ATTACKS
TOWARDS BUILDING TRUSTED SYSTEMS: VULNERABILITIES, THREATS AND
MITIGATION TECHNIQUES
HARDWARE IP WATERMARKING AND FINGERPRINTING
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
SECURE SYSTEM DESIGN AND TRUSTABLE COMPUTING
/
: 2016
ABSTRACT / INHALTSTEXT
THIS BOOK PROVIDES THE FOUNDATIONS FOR UNDERSTANDING HARDWARE SECURITY
AND TRUST, WHICH HAVE BECOME MAJOR CONCERNS FOR NATIONAL SECURITY OVER
THE PAST DECADE. COVERAGE INCLUDES ISSUES RELATED TO SECURITY AND
TRUST IN A VARIETY OF ELECTRONIC DEVICES AND SYSTEMS RELATED TO THE
SECURITY OF HARDWARE, FIRMWARE AND SOFTWARE, SPANNING SYSTEM
APPLICATIONS, ONLINE TRANSACTIONS, AND NETWORKING SERVICES. THIS
SERVES AS AN INVALUABLE REFERENCE TO THE STATE-OF-THE-ART RESEARCH THAT
IS OF CRITICAL SIGNIFICANCE TO THE SECURITY OF, AND TRUST IN, MODERN
SOCIETY’S MICROELECTRONIC-SUPPORTED INFRASTRUCTURES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Chang, Chip-Hong Potkonjak, Miodrag |
author2_role | edt edt |
author2_variant | c h c chc m p mp |
author_facet | Chang, Chip-Hong Potkonjak, Miodrag |
building | Verbundindex |
bvnumber | BV043210842 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)923665374 (DE-599)BVBBV043210842 |
dewey-full | 621.3815 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.3815 |
dewey-search | 621.3815 |
dewey-sort | 3621.3815 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-3-319-14971-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03251nmm a2200625zc 4500</leader><controlfield tag="001">BV043210842</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160617 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319149714</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-14971-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-14971-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)923665374</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043210842</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1043</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.3815</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure system design and trustable computing</subfield><subfield code="c">Chip-Hong Chang, Miodrag Potkonjak editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (xii, 537 p. 202 illus., 96 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microelectronics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic circuits</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Circuits and Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronics and Microelectronics, Instrumentation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chang, Chip-Hong</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Potkonjak, Miodrag</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-14970-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-14971-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633985&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633985&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028633985</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14971-4</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14971-4</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14971-4</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14971-4</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14971-4</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14971-4</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14971-4</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14971-4</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14971-4</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14971-4</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14971-4</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14971-4</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043210842 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:11:55Z |
institution | BVB |
isbn | 9783319149714 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028633985 |
oclc_num | 923665374 |
open_access_boolean | |
owner | DE-1043 DE-Aug4 DE-573 DE-859 DE-863 DE-BY-FWS DE-92 DE-862 DE-BY-FWS DE-898 DE-BY-UBR DE-634 DE-1046 DE-861 DE-706 |
owner_facet | DE-1043 DE-Aug4 DE-573 DE-859 DE-863 DE-BY-FWS DE-92 DE-862 DE-BY-FWS DE-898 DE-BY-UBR DE-634 DE-1046 DE-861 DE-706 |
physical | 1 Online Ressource (xii, 537 p. 202 illus., 96 illus. in color) |
psigel | ZDB-2-ENG ZDB-2-ENG_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer International Publishing |
record_format | marc |
spellingShingle | Secure system design and trustable computing Engineering Computer security Electronics Microelectronics Electronic circuits Circuits and Systems Systems and Data Security Electronics and Microelectronics, Instrumentation Ingenieurwissenschaften |
title | Secure system design and trustable computing |
title_auth | Secure system design and trustable computing |
title_exact_search | Secure system design and trustable computing |
title_full | Secure system design and trustable computing Chip-Hong Chang, Miodrag Potkonjak editors |
title_fullStr | Secure system design and trustable computing Chip-Hong Chang, Miodrag Potkonjak editors |
title_full_unstemmed | Secure system design and trustable computing Chip-Hong Chang, Miodrag Potkonjak editors |
title_short | Secure system design and trustable computing |
title_sort | secure system design and trustable computing |
topic | Engineering Computer security Electronics Microelectronics Electronic circuits Circuits and Systems Systems and Data Security Electronics and Microelectronics, Instrumentation Ingenieurwissenschaften |
topic_facet | Engineering Computer security Electronics Microelectronics Electronic circuits Circuits and Systems Systems and Data Security Electronics and Microelectronics, Instrumentation Ingenieurwissenschaften |
url | https://doi.org/10.1007/978-3-319-14971-4 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633985&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633985&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT changchiphong securesystemdesignandtrustablecomputing AT potkonjakmiodrag securesystemdesignandtrustablecomputing |