熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 29 筆, 頁數 1 / 1
呈現:
Hardware Security Primitives
|
|||
Hardware Security Primitives
Introduction.- Hardware Security Primitives and their Applications.- Racetrack PUF.- TERO PUF.- Dire... more |
|||
Physical Assurance: For Electronic Devices and Systems
This book provides readers with a comprehensive introduction to physical inspection-based approaches... more |
|||
Physical Assurance for Electronic Devices and Systems
This book provides readers with a comprehensive introduction to physical inspection-based approaches... more |
|||
Hardware Security: A Hands-on Learning Approach
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overvi... more |
|||
Hardware Protection Through Obfuscation
This book introduces readers to various threats faced during design and fabrication by today’s integ... more |
|||
Hardware Ip Security and Trust
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) desi... more |
|||
Counterfeit Integrated Circuits: Detection and Avoidance
This timely and exhaustive study offers a much-needed examination of the scope and consequences of t... more |
|||
Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection
This book describes techniques to verify the authenticity of integrated circuits (ICs). It focuses o... more |
|||
Test and Diagnosis for Small-Delay Defects
This book will introduce new techniques for detecting and diagnosing small-delay defects in integrat... more |
|||
Introduction to Hardware Security and Trust
This book provides the foundations for understanding hardware security and trust, which have become ... more |
|||
Emerging Nanotechnologies: Test, Defect Tolerance, and Reliability
Emerging Nanotechnologies: Test, Defect Tolerance and Reliability covers various technologies that h... more |
|||
Nanometer Technology Designs: High Quality Delay Tests
Adopting new fabrication technologies not only provides higher integration and enhances performance,... more |
|||
Emerging Topics in Hardware Security
This book provides an overview of emerging topics in the field of hardware security, such as artific... more |
|||
Emerging Topics in Hardware Security
This book provides an overview of emerging topics in the field of hardware security, such as artific... more |
|||
Security Opportunities in Nano Devices and Emerging Technologies
|
|||
Hardware Protection Through Obfuscation
This book introduces readers to various threats faced during design and fabrication by today’s integ... more |
|||
Hardware IP Security and Trust
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) desi... more |
|||
The Hardware Trojan War: Attacks, Myths, and Defenses
Explains details of hardware Trojan attacks and associated trust issues, including threat models/ins... more |
|||
Security Opportunities in Nano Devices and Emerging Technologies
|
|||
Introduction to Hardware Security and Trust
This book provides the foundations for understanding hardware security and trust, which have become ... more |
|||
Emerging Nanotechnologies: Test, Defect Tolerance, and Reliability
Emerging Nanotechnologies: Test, Defect Tolerance and Reliability covers various technologies that h... more |
|||
Hardware Security: A Look Into the Future
This book provides a look into the future of hardware and microelectronics security, with an emphasi... more |
|||
Hardware Security Training, Hands-On!
This is the first book dedicated to hands-on hardware security training. It includes a number of mod... more |
|||
硬體安全與可信導論
|
|||
Counterfeit Integrated Circuits: Detection and Avoidance
|
|||
Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection
|
|||
Materials for Electronics Security and Assurance
Materials for Electronics Security and Assurance reviews the properties of materials that could enab... more |
|||
The Hardware Trojan War: Attacks, Myths, and Defenses
Explains details of hardware Trojan attacks and associated trust issues, including threat models/ins... more |