0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Hardcover, Edition.): Benoit Badrignans, Jean-Luc... Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Hardcover, Edition.)
Benoit Badrignans, Jean-Luc Danger, Viktor Fischer, Guy Gogniat, Lionel Torres
R2,795 Discovery Miles 27 950 Ships in 10 - 15 working days

In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid. It is essential from a design point of view to be aware of all the levels in order to provide a comprehensive solution. The strength of a system is defined by its weakest point; there is no reason to enhance other protection means, if the weakest point remains untreated. Many severe attacks have considered this weakness in order not to face brute force attack complexity. Several solutions are proposed in Security Trends for FPGA's especially at the logical, architecture and system levels in order to provide a global solution.

Foundations of Hardware IP Protection (Hardcover, 1st ed. 2017): Lilian Bossuet, Lionel Torres Foundations of Hardware IP Protection (Hardcover, 1st ed. 2017)
Lilian Bossuet, Lionel Torres
R3,543 Discovery Miles 35 430 Ships in 10 - 15 working days

This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection.

Foundations of Hardware IP Protection (Paperback, Softcover reprint of the original 1st ed. 2017): Lilian Bossuet, Lionel Torres Foundations of Hardware IP Protection (Paperback, Softcover reprint of the original 1st ed. 2017)
Lilian Bossuet, Lionel Torres
R2,549 Discovery Miles 25 490 Ships in 10 - 15 working days

This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection.

Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Paperback, 2011 ed.): Benoit Badrignans, Jean-Luc... Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Paperback, 2011 ed.)
Benoit Badrignans, Jean-Luc Danger, Viktor Fischer, Guy Gogniat, Lionel Torres
R2,765 Discovery Miles 27 650 Ships in 10 - 15 working days

In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid. It is essential from a design point of view to be aware of all the levels in order to provide a comprehensive solution. The strength of a system is defined by its weakest point; there is no reason to enhance other protection means, if the weakest point remains untreated. Many severe attacks have considered this weakness in order not to face brute force attack complexity. Several solutions are proposed in Security Trends for FPGA's especially at the logical, architecture and system levels in order to provide a global solution.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Forgotten Drinks of Colonial New England…
Corin Hirsch Paperback R530 R441 Discovery Miles 4 410
Girls Of Little Hope
Sam Beckbessinger, Dale Halvorsen Paperback R280 R224 Discovery Miles 2 240
Marketing Secrets - Learn Rarely…
Stephen L. Fox Hardcover R2,707 R2,094 Discovery Miles 20 940
Virginia Distilled - Four Centuries of…
Patrick Evans-Hylton Hardcover R753 Discovery Miles 7 530
Payback In Death
J. D. Robb Paperback R280 R224 Discovery Miles 2 240
Systematic Complex Problem Solving in…
Denis Cavallucci, Stelian Brad, … Hardcover R2,872 Discovery Miles 28 720
Untamed
Glennon Doyle Paperback  (3)
R350 R273 Discovery Miles 2 730
Decentralized Computing Using Block…
S. Asharaf, S. Adarsh Hardcover R3,190 Discovery Miles 31 900
Montana Beer - A Guide to Breweries in…
Ryan Newhouse Paperback R521 R431 Discovery Miles 4 310
The Recovery Agent
Janet Evanovich Paperback R395 R324 Discovery Miles 3 240

 

Partners