語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Lightweight hardware security and physically unclonable functions = improving security of constrained IoT devices /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Lightweight hardware security and physically unclonable functions/ by Kasem Khalil ... [et al.].
其他題名:
improving security of constrained IoT devices /
其他作者:
Khalil, Kasem.
出版者:
Cham :Springer Nature Switzerland : : 2025.,
面頁冊數:
xiv, 152 p. :ill., digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Internet of things - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-031-76328-1
ISBN:
9783031763281
Lightweight hardware security and physically unclonable functions = improving security of constrained IoT devices /
Lightweight hardware security and physically unclonable functions
improving security of constrained IoT devices /[electronic resource] :by Kasem Khalil ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xiv, 152 p. :ill., digital ;24 cm.
Chapter 1 Introduction and Background -- Chapter 2 Exploring Classic Security Attacks and Hardware Intricacies -- Chapter 3 Hardware Security Challenges -- Chapter 4 Security in Resource-Constrained IoT Devices -- Chapter 5 Physically Unclonable Functions -- Chapter 6 PUF: Security Threats -- Chapter 7 PUF Performance Testing and Evaluation -- Chapter 8 Improving the PUF's Reliability -- Chapter 9 The Right Fit to your Device and Application -- Chapter 10 Advanced PUF designs -- Chapter 11 Lightweight PUF Protocols.
This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs. The authors provide a comprehensive study of the various approaches that are used to mitigate PUFs' shortcomings, while at the same time highlighting those that are most efficient. Coverage also includes state-of-the-art approaches to designing PUFs with high resilience to machine learning attacks and hardware implementation of area-efficient and high performing PUF architectures. The authors also classify different IoT applications and devices, depending on their security needs and limitations, offering a new perspective on how different PUF designs fit in the overall scope of IoT security. Classifies Physically Unclonable designs and their hardware implementations based on application needs; Explores advanced PUF techniques and protocols to enhance security for end nodes and edge devices; Presents state-of-the-art techniques and protocols to enhance the security and effectiveness of PUF devices.
ISBN: 9783031763281
Standard No.: 10.1007/978-3-031-76328-1doiSubjects--Topical Terms:
1129535
Internet of things
--Security measures.
LC Class. No.: TK5105.8857
Dewey Class. No.: 004.678
Lightweight hardware security and physically unclonable functions = improving security of constrained IoT devices /
LDR
:02738nam a2200325 a 4500
001
1161099
003
DE-He213
005
20250107115238.0
006
m d
007
cr nn 008maaau
008
251029s2025 sz s 0 eng d
020
$a
9783031763281
$q
(electronic bk.)
020
$a
9783031763274
$q
(paper)
024
7
$a
10.1007/978-3-031-76328-1
$2
doi
035
$a
978-3-031-76328-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.8857
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
004.678
$2
23
090
$a
TK5105.8857
$b
.L724 2025
245
0 0
$a
Lightweight hardware security and physically unclonable functions
$h
[electronic resource] :
$b
improving security of constrained IoT devices /
$c
by Kasem Khalil ... [et al.].
260
$a
Cham :
$c
2025.
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
300
$a
xiv, 152 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1 Introduction and Background -- Chapter 2 Exploring Classic Security Attacks and Hardware Intricacies -- Chapter 3 Hardware Security Challenges -- Chapter 4 Security in Resource-Constrained IoT Devices -- Chapter 5 Physically Unclonable Functions -- Chapter 6 PUF: Security Threats -- Chapter 7 PUF Performance Testing and Evaluation -- Chapter 8 Improving the PUF's Reliability -- Chapter 9 The Right Fit to your Device and Application -- Chapter 10 Advanced PUF designs -- Chapter 11 Lightweight PUF Protocols.
520
$a
This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs. The authors provide a comprehensive study of the various approaches that are used to mitigate PUFs' shortcomings, while at the same time highlighting those that are most efficient. Coverage also includes state-of-the-art approaches to designing PUFs with high resilience to machine learning attacks and hardware implementation of area-efficient and high performing PUF architectures. The authors also classify different IoT applications and devices, depending on their security needs and limitations, offering a new perspective on how different PUF designs fit in the overall scope of IoT security. Classifies Physically Unclonable designs and their hardware implementations based on application needs; Explores advanced PUF techniques and protocols to enhance security for end nodes and edge devices; Presents state-of-the-art techniques and protocols to enhance the security and effectiveness of PUF devices.
650
0
$a
Internet of things
$x
Security measures.
$3
1129535
650
1 4
$a
Electronic Circuits and Systems.
$3
1366689
650
2 4
$a
Internet of Things.
$3
1048478
650
2 4
$a
Cyber-Physical Systems.
$3
1387591
700
1
$a
Khalil, Kasem.
$3
1488111
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-76328-1
950
$a
Engineering (SpringerNature-11647)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入