This book presents advanced forensic detective control and obfuscation techniques for securing hardware IP cores by exploring beyond conventional technologies. The theme is important to researchers in various areas of specialization, because it encompasses the overlapping topics of EDA-CAD, hardware design security, VLSI design, IP core protection, optimization using evolutionary computing, system-on-chip design and finally application specific processor/hardware accelerator design for consumer electronics applications.
The book begins by introducing forensic detective control and obfuscation mechanisms for hardware and IP core security. Further chapters cover hardware stenography, digital signature driven hardware authentication, fault-secured IP cores using digital signature-based watermarks, multi-level watermarking, cryptosystem-based multi-variable fingerprinting, multi-phase and hologram-based obfuscation, and security of functionally obfuscated DSP cores.
"Sinopsis" puede pertenecer a otra edición de este libro.
Anirban Sengupta (PhD, FIET, FBCS) is an Associate Professor in Computer Science and Engineering at the Indian Institute of Technology (I.I.T) Indore. He has over 205 publications, 3 Books and 11 Patents and is an IEEE Distinguished Visitor of the IEEE Computer Society as well as an IEEE Distinguished Lecturer at the IEEE Consumer Electronics Society. He is an elected Fellow of the IET and Fellow of the British Computer Society. He is also the Deputy EiC of IET Computers and Digital Techniques and Chair, EiC of the IEEE Computer Society Technical Committee on VLSI as well as holding Editorial positions in more than a dozen IEEE Transactions/Journals/Magazines. He has held many Chair positions in major IEEE flagship conferences and is recipient of several IEEE Honors such as IEEE Editor Awards and Best Paper Awards from Journals/Magazines and Conferences.
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 4,90 gastos de envío en Estados Unidos de America
Destinos, gastos y plazos de envíoEUR 3,40 gastos de envío en Estados Unidos de America
Destinos, gastos y plazos de envíoLibrería: Recycle Bookstore, San Jose, CA, Estados Unidos de America
Hardcover. Condición: Very Good. Book has a small bump at the bottom of the back cover, otherwise in great condition. Well-bound with bright pages that are crisp and unmarked. Nº de ref. del artículo: 970874
Cantidad disponible: 1 disponibles
Librería: Books Puddle, New York, NY, Estados Unidos de America
Condición: New. Nº de ref. del artículo: 26376625461
Cantidad disponible: 1 disponibles
Librería: Best Price, Torrance, CA, Estados Unidos de America
Condición: New. SUPER FAST SHIPPING. Nº de ref. del artículo: 9781839530319
Cantidad disponible: 2 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: New. Nº de ref. del artículo: 39850170-n
Cantidad disponible: Más de 20 disponibles
Librería: Majestic Books, Hounslow, Reino Unido
Condición: New. Nº de ref. del artículo: 369452778
Cantidad disponible: 1 disponibles
Librería: Lucky's Textbooks, Dallas, TX, Estados Unidos de America
Condición: New. Nº de ref. del artículo: ABLIING23Mar2912160230817
Cantidad disponible: Más de 20 disponibles
Librería: Biblios, Frankfurt am main, HESSE, Alemania
Condición: New. Nº de ref. del artículo: 18376625471
Cantidad disponible: 1 disponibles
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
Condición: New. Nº de ref. del artículo: 39850170-n
Cantidad disponible: Más de 20 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: As New. Unread book in perfect condition. Nº de ref. del artículo: 39850170
Cantidad disponible: Más de 20 disponibles
Librería: Rarewaves USA, OSWEGO, IL, Estados Unidos de America
Hardback. Condición: New. This book presents advanced forensic detective control and obfuscation techniques for securing hardware IP cores by exploring beyond conventional technologies. The theme is important to researchers in various areas of specialization, because it encompasses the overlapping topics of EDA-CAD, hardware design security, VLSI design, IP core protection, optimization using evolutionary computing, system-on-chip design and finally application specific processor/hardware accelerator design for consumer electronics applications. The book begins by introducing forensic detective control and obfuscation mechanisms for hardware and IP core security. Further chapters cover hardware stenography, digital signature driven hardware authentication, fault-secured IP cores using digital signature-based watermarks, multi-level watermarking, cryptosystem-based multi-variable fingerprinting, multi-phase and hologram-based obfuscation, and security of functionally obfuscated DSP cores. Nº de ref. del artículo: LU-9781839530319
Cantidad disponible: Más de 20 disponibles