0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Physically Unclonable Functions (PUFs) - Applications, Models, and Future Directions (Paperback) Loot Price: R876
Discovery Miles 8 760
Physically Unclonable Functions (PUFs) - Applications, Models, and Future Directions (Paperback): Christian Wachsmann,...

Physically Unclonable Functions (PUFs) - Applications, Models, and Future Directions (Paperback)

Christian Wachsmann, Ahmad-Reza Sadeghi

Series: Synthesis Lectures on Information Security, Privacy, and Trust

 (sign in to rate)
Loot Price R876 Discovery Miles 8 760 | Repayment Terms: R82 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly used to produce and process both security-critical and privacy-sensitive data, which bear many security and privacy risks. Establishing trust in the underlying devices and making them resistant to software and hardware attacks is a fundamental requirement in many applications and a challenging, yet unsolved, task. Solutions solely based on software can never ensure their own integrity and trustworthiness while resource-constraints and economic factors often prevent the integration of sophisticated security hardware and cryptographic co-processors. In this context, Physically Unclonable Functions (PUFs) are an emerging and promising technology to establish trust in embedded systems with minimal hardware requirements. This book explores the design of trusted embedded systems based on PUFs. Specifically, it focuses on the integration of PUFs into secure and efficient cryptographic protocols that are suitable for a variety of embedded systems. It exemplarily discusses how PUFs can be integrated into lightweight device authentication and attestation schemes, which are popular and highly relevant applications of PUFs in practice. For the integration of PUFs into secure cryptographic systems, it is essential to have a clear view of their properties. This book gives an overview of different approaches to evaluate the properties of PUF implementations and presents the results of a large scale security analysis of different PUF types implemented in application-specific integrated circuits (ASICs). To analyze the security of PUF-based schemes as is common in modern cryptography, it is necessary to have a security framework for PUFs and PUF-based systems. In this book, we give a flavor of the formal modeling of PUFs that is in its beginning and that is still undergoing further refinement in current research. The objective of this book is to provide a comprehensive overview of the current state of secure PUF-based cryptographic system design and the related challenges and limitations. Table of Contents: Preface / Introduction / Basics of Physically Unclonable Functions / Attacks on PUFs and PUF-based Systems / Advanced PUF Concepts / PUF Implementations and Evaluation / PUF-based Cryptographic Protocols / Security Model for PUF-based Systems / Conclusion / Terms and Abbreviations / Bibliography / Authors' Biographies

General

Imprint: Springer International Publishing AG
Country of origin: Switzerland
Series: Synthesis Lectures on Information Security, Privacy, and Trust
Release date: 2015
First published: 2015
Authors: Christian Wachsmann • Ahmad-Reza Sadeghi
Dimensions: 235 x 191mm (L x W)
Format: Paperback
Pages: 81
ISBN-13: 978-3-03-101216-7
Languages: English
Subtitles: English
Categories: Books > Computing & IT > Computer communications & networking > Network security
Promotions
LSN: 3-03-101216-X
Barcode: 9783031012167

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,732 R1,384 Discovery Miles 13 840
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,357 R1,262 Discovery Miles 12 620
PCI Dss: A Pocket Guide
IT Governance Paperback R415 Discovery Miles 4 150
Two-Factor Authentication
Mark Stanislav Paperback R532 Discovery Miles 5 320
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R681 Discovery Miles 6 810
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R12,724 Discovery Miles 127 240
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,899 Discovery Miles 68 990
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,629 Discovery Miles 86 290
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R6,599 Discovery Miles 65 990
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,599 Discovery Miles 65 990
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,357 Discovery Miles 13 570
Handbook of Research on Cyber Approaches…
Fahri OEzsungur Hardcover R8,850 Discovery Miles 88 500

See more

Partners