
SULJE VALIKKO
KIRJAUDU
This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection.
Sisäänkirjautuminen
Kirjaudu sisäänRekisteröityminen |
Oma tili
Omat tiedotOmat tilaukset Omat laskut |
Lisätietoja
AsiakaspalveluTietoa verkkokaupasta Toimitusehdot Tietosuojaseloste |