0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Security Opportunities in Nano Devices and Emerging Technologies (Paperback): Mark Tehranipoor, Domenic Forte, Swarup Bhunia,... Security Opportunities in Nano Devices and Emerging Technologies (Paperback)
Mark Tehranipoor, Domenic Forte, Swarup Bhunia, Garrett Rose
R1,465 Discovery Miles 14 650 Ships in 12 - 17 working days

The research community lacks both the capability to explain the effectiveness of existing techniques and the metrics to predict the security properties and vulnerabilities of the next generation of nano-devices and systems. This book provides in-depth viewpoints on security issues and explains how nano devices and their unique properties can address the opportunities and challenges of the security community, manufacturers, system integrators, and end users. This book elevates security as a fundamental design parameter, transforming the way new nano-devices are developed. Part 1 focuses on nano devices and building security primitives. Part 2 focuses on emerging technologies and integrations.

Security Opportunities in Nano Devices and Emerging Technologies (Hardcover): Mark Tehranipoor, Domenic Forte, Swarup Bhunia,... Security Opportunities in Nano Devices and Emerging Technologies (Hardcover)
Mark Tehranipoor, Domenic Forte, Swarup Bhunia, Garrett Rose
R4,316 Discovery Miles 43 160 Ships in 12 - 17 working days

The research community lacks both the capability to explain the effectiveness of existing techniques and the metrics to predict the security properties and vulnerabilities of the next generation of nano-devices and systems. This book provides in-depth viewpoints on security issues and explains how nano devices and their unique properties can address the opportunities and challenges of the security community, manufacturers, system integrators, and end users. This book elevates security as a fundamental design parameter, transforming the way new nano-devices are developed. Part 1 focuses on nano devices and building security primitives. Part 2 focuses on emerging technologies and integrations.

Hardware Protection through Obfuscation (Paperback, Softcover reprint of the original 1st ed. 2017): Domenic Forte, Swarup... Hardware Protection through Obfuscation (Paperback, Softcover reprint of the original 1st ed. 2017)
Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor
R3,234 Discovery Miles 32 340 Ships in 10 - 15 working days

This book introduces readers to various threats faced during design and fabrication by today's integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or "IC Overproduction," insertion of malicious circuits, referred as "Hardware Trojans", which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.

Hardware Protection through Obfuscation (Hardcover, 1st ed. 2017): Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor Hardware Protection through Obfuscation (Hardcover, 1st ed. 2017)
Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor
R5,806 Discovery Miles 58 060 Ships in 10 - 15 working days

This book introduces readers to various threats faced during design and fabrication by today's integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or "IC Overproduction," insertion of malicious circuits, referred as "Hardware Trojans", which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.

Counterfeit Integrated Circuits - Detection and Avoidance (Hardcover): Mark (Mohammad) Tehranipoor, Ujjwal Guin, Domenic Forte Counterfeit Integrated Circuits - Detection and Avoidance (Hardcover)
Mark (Mohammad) Tehranipoor, Ujjwal Guin, Domenic Forte
R5,693 Discovery Miles 56 930 Ships in 10 - 15 working days

This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade. The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs). Not only does this book provide an assessment of the current counterfeiting problems facing both the public and private sectors, it also offers practical, real-world solutions for combatting this substantial threat. * Helps beginners and practitioners in the field by providing a comprehensive background on the counterfeiting problem; * Presents innovative taxonomies for counterfeit types, test methods, and counterfeit defects, which allows for a detailed analysis of counterfeiting and its mitigation; * Provides step-by-step solutions for detecting different types of counterfeit ICs; * Offers pragmatic and practice-oriented, realistic solutions to counterfeit IC detection and avoidance, for industry and government.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Morbius
Jared Leto, Matt Smith, … DVD R179 Discovery Miles 1 790
Bestway Beach Ball (51cm)
 (2)
R26 Discovery Miles 260
Wonder Plant Food Stix - Premium Plant…
R49 R41 Discovery Miles 410
Aerolatte Cappuccino Art Stencils (Set…
R110 R95 Discovery Miles 950
Butterfly A4 160gsm Board Pad - Designer…
R70 Discovery Miles 700
Unicorn Maestro 100 Flights (SA Flag…
R29 R17 Discovery Miles 170
Joseph Joseph Index Mini (Graphite)
R642 Discovery Miles 6 420
Shield Anti Freeze/Summer Cooolant 96…
R86 Discovery Miles 860
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300

 

Partners