<P>THIS BOOK DISCUSSES THE DESIGN PRINCIPLES OF PHYSICALLY UNCLONABLE FUNCTIONS (PUFS) AND HOW THESE CAN BE EMPLOYED IN HARDWARE-BASED SECURITY APPLICATIONS, IN PARTICULAR, THE BOOK PROVIDES READERS WITH A COMPREHENSIVE OVERVIEW OF SECURITY THREATS AND EXISTING COUNTERMEASURES.</P><P>THIS BOOK HAS MANY FEATURES THAT MAKE IT A UNIQUE SOURCE FOR STUDENTS, ENGINEERS AND EDUCATORS, INCLUDING MORE THAN 80 PROBLEMS AND WORKED EXERCISES, IN ADDITION TO, APPROXIMATELY 200 REFERENCES, WHICH GIVE EXTENSIVE DIRECTION FOR FURTHER READING.</P><P> </P><P>&NBSP;</P>
This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and existing countermeasures.
This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.