0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (7)
  • -
Status
Brand

Showing 1 - 11 of 11 matches in All Departments

Authentication of Embedded Devices - Technologies, Protocols and Emerging Applications (Hardcover, 1st ed. 2021): Basel Halak Authentication of Embedded Devices - Technologies, Protocols and Emerging Applications (Hardcover, 1st ed. 2021)
Basel Halak
R2,553 Discovery Miles 25 530 Ships in 10 - 15 working days

This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications. The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival. Provides deep insight into the security threats undermining existing integrated circuit authentication techniques; Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems; Offers a comprehensive summary of existing authentication protocols and their limitations; Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption; Includes detailed case studies on the emerging applications of IC authentication schemes.

Ageing of Integrated Circuits - Causes, Effects and Mitigation Techniques (Hardcover, 1st ed. 2020): Basel Halak Ageing of Integrated Circuits - Causes, Effects and Mitigation Techniques (Hardcover, 1st ed. 2020)
Basel Halak
R3,044 Discovery Miles 30 440 Ships in 10 - 15 working days

This book provides comprehensive coverage of the latest research into integrated circuits' ageing, explaining the causes of this phenomenon, describing its effects on electronic systems, and providing mitigation techniques to build ageing-resilient circuits.

Hardware Supply Chain Security - Threat Modelling, Emerging Attacks and Countermeasures (Hardcover, 1st ed. 2021): Basel Halak Hardware Supply Chain Security - Threat Modelling, Emerging Attacks and Countermeasures (Hardcover, 1st ed. 2021)
Basel Halak
R3,282 Discovery Miles 32 820 Ships in 10 - 15 working days

This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.

Machine Learning for Embedded System Security (Hardcover, 1st ed. 2022): Basel Halak Machine Learning for Embedded System Security (Hardcover, 1st ed. 2022)
Basel Halak
R2,720 Discovery Miles 27 200 Ships in 12 - 17 working days

This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities.

Physically Unclonable Functions - From Basic Design Principles to Advanced Hardware Security Applications (Hardcover, 1st ed.... Physically Unclonable Functions - From Basic Design Principles to Advanced Hardware Security Applications (Hardcover, 1st ed. 2018)
Basel Halak
R2,832 Discovery Miles 28 320 Ships in 12 - 17 working days

This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and existing countermeasures. This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.

Physically Unclonable Functions - From Basic Design Principles to Advanced Hardware Security Applications (Paperback, Softcover... Physically Unclonable Functions - From Basic Design Principles to Advanced Hardware Security Applications (Paperback, Softcover reprint of the original 1st ed. 2018)
Basel Halak
R1,709 Discovery Miles 17 090 Ships in 10 - 15 working days

This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and existing countermeasures. This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.

Machine Learning for Embedded System Security (1st ed. 2022): Basel Halak Machine Learning for Embedded System Security (1st ed. 2022)
Basel Halak
R2,754 Discovery Miles 27 540 Ships in 10 - 15 working days

This book comprehensively covers the state-of-the-art security applications of machine learning techniques.  The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities. 

Hardware Supply Chain Security - Threat Modelling, Emerging Attacks and Countermeasures (Paperback, 1st ed. 2021): Basel Halak Hardware Supply Chain Security - Threat Modelling, Emerging Attacks and Countermeasures (Paperback, 1st ed. 2021)
Basel Halak
R3,251 Discovery Miles 32 510 Ships in 10 - 15 working days

This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.

Authentication of Embedded Devices - Technologies, Protocols and Emerging Applications (Paperback, 1st ed. 2021): Basel Halak Authentication of Embedded Devices - Technologies, Protocols and Emerging Applications (Paperback, 1st ed. 2021)
Basel Halak
R1,802 Discovery Miles 18 020 Ships in 10 - 15 working days

This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications. The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival. Provides deep insight into the security threats undermining existing integrated circuit authentication techniques; Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems; Offers a comprehensive summary of existing authentication protocols and their limitations; Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption; Includes detailed case studies on the emerging applications of IC authentication schemes.

Ageing of Integrated Circuits - Causes, Effects and Mitigation Techniques (Paperback, 1st ed. 2020): Basel Halak Ageing of Integrated Circuits - Causes, Effects and Mitigation Techniques (Paperback, 1st ed. 2020)
Basel Halak
R2,294 Discovery Miles 22 940 Ships in 10 - 15 working days

This book provides comprehensive coverage of the latest research into integrated circuits' ageing, explaining the causes of this phenomenon, describing its effects on electronic systems, and providing mitigation techniques to build ageing-resilient circuits.

VLSI Design of ECG Monitor from Concept to Silicon (Paperback): Basel Halak VLSI Design of ECG Monitor from Concept to Silicon (Paperback)
Basel Halak
R1,003 Discovery Miles 10 030 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Catholic New Hampshire
Barbara D Miles Paperback R587 R484 Discovery Miles 4 840
The Evolution of Love
Sheldon W Liebman Hardcover R1,922 R1,526 Discovery Miles 15 260
An Introduction to the History of…
George Herring Hardcover R2,252 Discovery Miles 22 520
Ark of the Covenant
Jonathan Gray Hardcover R1,167 Discovery Miles 11 670
The Studia Philonica Annual XXIX, 2017…
David T. Runia, Gregory E. Sterling Hardcover R1,337 Discovery Miles 13 370
Friends from Within - Faith in humanity…
Amrom Gottesman Hardcover R614 R515 Discovery Miles 5 150
The Works of Josephus
Flavius Josephus Paperback R670 Discovery Miles 6 700
The Pharisees
Kent L. Yinger Hardcover R1,110 R900 Discovery Miles 9 000
Studies in Rabbinic Narratives, Volume 1
Jeffrey L Rubenstein Hardcover R1,860 Discovery Miles 18 600
The Hebrew Priestess - Ancient and New…
Jill Hammer, Taya Shere Hardcover R1,092 Discovery Miles 10 920

 

Partners