![]() |
![]() |
Your cart is empty |
||
Showing 1 - 5 of 5 matches in All Departments
This book presents advanced forensic detective control and obfuscation techniques for securing hardware IP cores by exploring beyond conventional technologies. The theme is important to researchers in various areas of specialization, because it encompasses the overlapping topics of EDA-CAD, hardware design security, VLSI design, IP core protection, optimization using evolutionary computing, system-on-chip design and finally application specific processor/hardware accelerator design for consumer electronics applications. The book begins by introducing forensic detective control and obfuscation mechanisms for hardware and IP core security. Further chapters cover hardware stenography, digital signature driven hardware authentication, fault-secured IP cores using digital signature-based watermarks, multi-level watermarking, cryptosystem-based multi-variable fingerprinting, multi-phase and hologram-based obfuscation, and security of functionally obfuscated DSP cores.
This book constitutes the refereed proceedings of the 23st International Symposium on VLSI Design and Test, VDAT 2019, held in Indore, India, in July 2019. The 63 full papers were carefully reviewed and selected from 199 submissions. The papers are organized in topical sections named: analog and mixed signal design; computing architecture and security; hardware design and optimization; low power VLSI and memory design; device modelling; and hardware implementation.
IP Core Protection and Hardware-Assisted Security for Consumer Electronics presents established and novel solutions for security and protection problems related to IP cores (especially those based on DSP/multimedia applications) in consumer electronics. The topic is important to researchers in various areas of specialization, encompassing overlapping topics such as EDA-CAD, hardware design security, VLSI design, IP core protection, optimization using evolutionary computing, system-on-chip design and application specific processor/hardware accelerator design. The book begins by introducing the concepts of security, privacy and IP protection in information systems. Later chapters focus specifically on hardware-assisted IP security in consumer electronics, with coverage including essential topics such as hardware Trojan security, robust watermarking, fingerprinting, structural and functional obfuscation, encryption, IoT security, forensic engineering based protection, JPEG obfuscation design, hardware assisted media protection, PUF and side-channel attack resistance.
A carpenter's wife gives birth to a still-born God at a relief camp. Pink Floyd begins to make more sense than a two decade long relationship with formal education. Her lover keeps coming back to her life almost like her bronchial infection. Pigeons get suicidal. Crows are paranoid. "so far and during" is a poet's response to the times when rare are mornings that are happy inside.
|
![]() ![]() You may like...
Biology of Aminoacyl-tRNA Synthetases…
Lluis Ribas de Pouplana, Laurie S. Kaguni
Hardcover
Biomaterials for 3D Tumor Modeling
Subhas C. Kundu, Rui L. Reis
Paperback
R6,343
Discovery Miles 63 430
Finite Elements and Fast Iterative…
Howard Elman, David Silvester, …
Hardcover
R4,587
Discovery Miles 45 870
|