0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Hardcover, Edition.): Benoit Badrignans, Jean-Luc... Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Hardcover, Edition.)
Benoit Badrignans, Jean-Luc Danger, Viktor Fischer, Guy Gogniat, Lionel Torres
R2,880 Discovery Miles 28 800 Ships in 10 - 15 working days

In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid. It is essential from a design point of view to be aware of all the levels in order to provide a comprehensive solution. The strength of a system is defined by its weakest point; there is no reason to enhance other protection means, if the weakest point remains untreated. Many severe attacks have considered this weakness in order not to face brute force attack complexity. Several solutions are proposed in Security Trends for FPGA's especially at the logical, architecture and system levels in order to provide a global solution.

Foundations of Hardware IP Protection (Hardcover, 1st ed. 2017): Lilian Bossuet, Lionel Torres Foundations of Hardware IP Protection (Hardcover, 1st ed. 2017)
Lilian Bossuet, Lionel Torres
R3,646 Discovery Miles 36 460 Ships in 10 - 15 working days

This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection.

Foundations of Hardware IP Protection (Paperback, Softcover reprint of the original 1st ed. 2017): Lilian Bossuet, Lionel Torres Foundations of Hardware IP Protection (Paperback, Softcover reprint of the original 1st ed. 2017)
Lilian Bossuet, Lionel Torres
R2,628 Discovery Miles 26 280 Ships in 10 - 15 working days

This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection.

Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Paperback, 2011 ed.): Benoit Badrignans, Jean-Luc... Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Paperback, 2011 ed.)
Benoit Badrignans, Jean-Luc Danger, Viktor Fischer, Guy Gogniat, Lionel Torres
R2,849 Discovery Miles 28 490 Ships in 10 - 15 working days

In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid. It is essential from a design point of view to be aware of all the levels in order to provide a comprehensive solution. The strength of a system is defined by its weakest point; there is no reason to enhance other protection means, if the weakest point remains untreated. Many severe attacks have considered this weakness in order not to face brute force attack complexity. Several solutions are proposed in Security Trends for FPGA's especially at the logical, architecture and system levels in order to provide a global solution.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Opportunities and Challenges for…
Joao Bento, Miguel Torres Hardcover R6,736 Discovery Miles 67 360
The Doctrine of Everlasting Punishment…
Josiah Litch Paperback R403 Discovery Miles 4 030
Physiology and Nutrition for Amateur…
Charles Paul Lambert Hardcover R5,516 Discovery Miles 55 160
The Wounded Self - Writing Illness in…
Nina Schmidt Paperback R919 Discovery Miles 9 190
Vortex Control Self-Defense - Hand to…
Sam Fury Hardcover R507 Discovery Miles 5 070
Embodied Performance as Applied…
Julie-Ann Scott Hardcover R4,082 Discovery Miles 40 820
Land, Memory, Reconstruction and Justice…
Anna Bohlin, Ruth Hall, … Paperback R120 R111 Discovery Miles 1 110
Sitting Pretty - White Afrikaans Women…
Christi van der Westhuizen Paperback  (1)
R365 R337 Discovery Miles 3 370
The German Melting Pot…
W. Zank Hardcover R2,892 Discovery Miles 28 920
The Land Is Ours - Black Lawyers And The…
Tembeka Ngcukaitobi Paperback  (11)
R400 R369 Discovery Miles 3 690

 

Partners