語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Lightweight hardware security and ph...
~
Khalil, Kasem.
FindBook
Google Book
Amazon
博客來
Lightweight hardware security and physically unclonable functions = improving security of constrained IoT devices /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Lightweight hardware security and physically unclonable functions/ by Kasem Khalil ... [et al.].
其他題名:
improving security of constrained IoT devices /
其他作者:
Khalil, Kasem.
出版者:
Cham :Springer Nature Switzerland : : 2025.,
面頁冊數:
xiv, 152 p. :ill., digital ;24 cm.
內容註:
Chapter 1 Introduction and Background -- Chapter 2 Exploring Classic Security Attacks and Hardware Intricacies -- Chapter 3 Hardware Security Challenges -- Chapter 4 Security in Resource-Constrained IoT Devices -- Chapter 5 Physically Unclonable Functions -- Chapter 6 PUF: Security Threats -- Chapter 7 PUF Performance Testing and Evaluation -- Chapter 8 Improving the PUF's Reliability -- Chapter 9 The Right Fit to your Device and Application -- Chapter 10 Advanced PUF designs -- Chapter 11 Lightweight PUF Protocols.
Contained By:
Springer Nature eBook
標題:
Internet of things - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-031-76328-1
ISBN:
9783031763281
Lightweight hardware security and physically unclonable functions = improving security of constrained IoT devices /
Lightweight hardware security and physically unclonable functions
improving security of constrained IoT devices /[electronic resource] :by Kasem Khalil ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xiv, 152 p. :ill., digital ;24 cm.
Chapter 1 Introduction and Background -- Chapter 2 Exploring Classic Security Attacks and Hardware Intricacies -- Chapter 3 Hardware Security Challenges -- Chapter 4 Security in Resource-Constrained IoT Devices -- Chapter 5 Physically Unclonable Functions -- Chapter 6 PUF: Security Threats -- Chapter 7 PUF Performance Testing and Evaluation -- Chapter 8 Improving the PUF's Reliability -- Chapter 9 The Right Fit to your Device and Application -- Chapter 10 Advanced PUF designs -- Chapter 11 Lightweight PUF Protocols.
This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs. The authors provide a comprehensive study of the various approaches that are used to mitigate PUFs' shortcomings, while at the same time highlighting those that are most efficient. Coverage also includes state-of-the-art approaches to designing PUFs with high resilience to machine learning attacks and hardware implementation of area-efficient and high performing PUF architectures. The authors also classify different IoT applications and devices, depending on their security needs and limitations, offering a new perspective on how different PUF designs fit in the overall scope of IoT security. Classifies Physically Unclonable designs and their hardware implementations based on application needs; Explores advanced PUF techniques and protocols to enhance security for end nodes and edge devices; Presents state-of-the-art techniques and protocols to enhance the security and effectiveness of PUF devices.
ISBN: 9783031763281
Standard No.: 10.1007/978-3-031-76328-1doiSubjects--Topical Terms:
3217048
Internet of things
--Security measures.
LC Class. No.: TK5105.8857
Dewey Class. No.: 004.678
Lightweight hardware security and physically unclonable functions = improving security of constrained IoT devices /
LDR
:02738nmm a2200325 a 4500
001
2409006
003
DE-He213
005
20250107115238.0
006
m d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783031763281
$q
(electronic bk.)
020
$a
9783031763274
$q
(paper)
024
7
$a
10.1007/978-3-031-76328-1
$2
doi
035
$a
978-3-031-76328-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.8857
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
004.678
$2
23
090
$a
TK5105.8857
$b
.L724 2025
245
0 0
$a
Lightweight hardware security and physically unclonable functions
$h
[electronic resource] :
$b
improving security of constrained IoT devices /
$c
by Kasem Khalil ... [et al.].
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xiv, 152 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1 Introduction and Background -- Chapter 2 Exploring Classic Security Attacks and Hardware Intricacies -- Chapter 3 Hardware Security Challenges -- Chapter 4 Security in Resource-Constrained IoT Devices -- Chapter 5 Physically Unclonable Functions -- Chapter 6 PUF: Security Threats -- Chapter 7 PUF Performance Testing and Evaluation -- Chapter 8 Improving the PUF's Reliability -- Chapter 9 The Right Fit to your Device and Application -- Chapter 10 Advanced PUF designs -- Chapter 11 Lightweight PUF Protocols.
520
$a
This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs. The authors provide a comprehensive study of the various approaches that are used to mitigate PUFs' shortcomings, while at the same time highlighting those that are most efficient. Coverage also includes state-of-the-art approaches to designing PUFs with high resilience to machine learning attacks and hardware implementation of area-efficient and high performing PUF architectures. The authors also classify different IoT applications and devices, depending on their security needs and limitations, offering a new perspective on how different PUF designs fit in the overall scope of IoT security. Classifies Physically Unclonable designs and their hardware implementations based on application needs; Explores advanced PUF techniques and protocols to enhance security for end nodes and edge devices; Presents state-of-the-art techniques and protocols to enhance the security and effectiveness of PUF devices.
650
0
$a
Internet of things
$x
Security measures.
$3
3217048
650
1 4
$a
Electronic Circuits and Systems.
$3
3538814
650
2 4
$a
Internet of Things.
$3
3538511
650
2 4
$a
Cyber-Physical Systems.
$3
3591993
700
1
$a
Khalil, Kasem.
$3
3781940
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-76328-1
950
$a
Engineering (SpringerNature-11647)
based on 0 review(s)
Location:
全部
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9514504
電子資源
11.線上閱覽_V
電子書
EB TK5105.8857
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login