Physically Unclonable Functions

Hardware Security: Design, Threats, and Safeguards (repost)  eBooks & eLearning

Posted by arundhati at Jan. 16, 2016
Hardware Security: Design, Threats, and Safeguards (repost)

Debdeep Mukhopadhyay, "Hardware Security: Design, Threats, and Safeguards"
English | ISBN: 143989583X | 2014 | 542 pages | PDF | 19 MB

Machine Learning for Embedded System Security  eBooks & eLearning

Posted by yoyoloit at April 24, 2022
Machine Learning for Embedded System Security

Machine Learning for Embedded System Security
by Basel Halak

English | 2022 | ISBN: ‎ 3030941779 | 166 pages | True PDF EPUB | 19.28 MB

Principles of Secure Processor Architecture Design  eBooks & eLearning

Posted by Underaglassmoon at Oct. 29, 2018
Principles of Secure Processor Architecture Design

Principles of Secure Processor Architecture Design
Morgan & Claypool | English | 2019 | ISBN-10: 1681730014 | 173 pages | PDF | 3.26 MB

by Jakub Szefer (Author), Margaret Martonosi (Editor)
With growing interest in computer security and the protection of the code and data which execute on commodity computers, the amount of hardware security features in today's processors has increased significantly over the recent years
The Next Era in Hardware Security: A Perspective on Emerging Technologies for Secure Electronics

The Next Era in Hardware Security: A Perspective on Emerging Technologies for Secure Electronics by Nikhil Rangarajan
English | PDF,EPUB | 2021 | 271 Pages | ISBN : 3030857913 | 54.4 MB

This book provides a comprehensive coverage of hardware security concepts, derived from the unique characteristics of emerging logic and memory devices and related architectures. The primary focus is on mapping device-specific properties, such as multi-functionality, runtime polymorphism, intrinsic entropy, nonlinearity, ease of heterogeneous integration, and tamper-resilience to the corresponding security primitives that they help realize, such as static and dynamic camouflaging, true random number generation, physically unclonable functions, secure heterogeneous and large-scale systems, and tamper-proof memories.

Authentication of Embedded Devices  eBooks & eLearning

Posted by hill0 at Jan. 23, 2021
Authentication of Embedded Devices

Authentication of Embedded Devices: Technologies, Protocols and Emerging Applications
by Basel Halak

English | 2021 | ISBN: 3030607682 | 348 Pages | PDF EPUB | 16 MB

Hardware Security: Design, Threats, and Safeguards  eBooks & eLearning

Posted by roxul at Nov. 5, 2014
Hardware Security: Design, Threats, and Safeguards

Debdeep Mukhopadhyay, "Hardware Security: Design, Threats, and Safeguards"
English | ISBN: 143989583X | 2014 | 542 pages | PDF | 19 MB

Trust and Trustworthy Computing - TRUST 2011  eBooks & eLearning

Posted by tot167 at July 16, 2011
Trust and Trustworthy Computing - TRUST 2011

Jonathan McCune, Boris Balacheff, Adrian Perrig, Ahmad-Reza Sadeghi, Angela Sasse, Yolanta Beres, "Trust and Trustworthy Computing - TRUST 2011"
S ing er | 2011 | ISBN: 364221598X | 321 pages | PDF | 4,6 MB
"Cryptography: Recent Advances and Future Developments" ed. by Riccardo Bernardini

"Cryptography: Recent Advances and Future Developments" ed. by Riccardo Bernardini
ITexLi | 2021 | ISBN: 183962566X 9781839625664 1839625651 9781839625657 1839625880 9781839625886 | 133 pages | PDF | 6 MB

This book discusses quantum cryptography, lightweight cryptography for IoT, PUFs, cryptanalysis, and more. It provides a snapshot of some recent research results in the field, providing readers with some useful tools and stimulating new ideas and applications for future investigation.