product
3825764Authentication of Embedded Deviceshttps://www.gandhi.com.mx/authentication-of-embedded-devices-9783030607692/phttps://gandhi.vtexassets.com/arquivos/ids/3510368/cd389508-cdc3-4248-ae27-b57fa361bf2f.jpg?v=63838547646943000012681409MXNSpringer International PublishingInStock/Ebooks/<p>This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.</p><p>The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival.</p><ul><li>Provides deep insight into the security threats undermining existing integrated circuit authentication techniques;</li><li>Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems;</li><li>Offers a comprehensive summary of existing authentication protocols and their limitations;</li><li>Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption;</li><li>Includes detailed case studies on the emerging applications of IC authentication schemes.</li></ul>...3761673Authentication of Embedded Devices12681409https://www.gandhi.com.mx/authentication-of-embedded-devices-9783030607692/phttps://gandhi.vtexassets.com/arquivos/ids/3510368/cd389508-cdc3-4248-ae27-b57fa361bf2f.jpg?v=638385476469430000InStockMXN99999DIEbook20219783030607692_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_<p>This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.</p><p>The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival.</p><ul><li>Provides deep insight into the security threats undermining existing integrated circuit authentication techniques;</li><li>Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems;</li><li>Offers a comprehensive summary of existing authentication protocols and their limitations;</li><li>Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption;</li><li>Includes detailed case studies on the emerging applications of IC authentication schemes.</li></ul>(*_*)9783030607692_<p>This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.</p><p>The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival.</p><ul><li>Provides deep insight into the security threats undermining existing integrated circuit authentication techniques;</li><li>Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems;</li><li>Offers a comprehensive summary of existing authentication protocols and their limitations;</li><li>Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption;</li><li>Includes detailed case studies on the emerging applications of IC authentication schemes.</li></ul>...9783030607692_Springer International Publishinglibro_electonico_3f408252-1e5a-3c40-a9de-68af7925b74f_9783030607692;9783030607692_9783030607692InglésMéxico2021-01-22T00:00:00+00:00Springer International Publishing