001434314 000__ 04095cam\a2200637\i\4500 001434314 001__ 1434314 001434314 003__ OCoLC 001434314 005__ 20230309003722.0 001434314 006__ m\\\\\o\\d\\\\\\\\ 001434314 007__ cr\nn\nnnunnun 001434314 008__ 210122s2021\\\\sz\a\\\\o\\\\\001\0\eng\d 001434314 019__ $$a1233030753$$a1235593237$$a1241066214$$a1241237638$$a1244117434 001434314 020__ $$a9783030607692$$q(electronic bk.) 001434314 020__ $$a3030607690$$q(electronic bk.) 001434314 020__ $$z9783030607685 001434314 020__ $$z3030607682 001434314 0247_ $$a10.1007/978-3-030-60769-2$$2doi 001434314 035__ $$aSP(OCoLC)1239686070 001434314 040__ $$aUKBTH$$beng$$erda$$epn$$cUKBTH$$dOCLCO$$dEBLCP$$dGW5XE$$dOCLCO$$dYDX$$dAU@$$dYDXIT$$dDKU$$dN$T$$dDCT$$dOCLCF$$dUKAHL$$dOCLCQ$$dOCLCO$$dOCLCQ 001434314 049__ $$aISEA 001434314 050_4 $$aTK7874.58 001434314 08204 $$a621.3815$$223 001434314 24500 $$aAuthentication of embedded devices :$$btechnologies, protocols and emerging applications /$$cBasel Halak, editor. 001434314 264_1 $$aCham :$$bSpringer,$$c[2021] 001434314 300__ $$a1 online resource (xv, 188 pages) :$$billustrations (some color) 001434314 336__ $$atext$$btxt$$2rdacontent 001434314 337__ $$acomputer$$bc$$2rdamedia 001434314 338__ $$aonline resource$$bcr$$2rdacarrier 001434314 347__ $$atext file 001434314 347__ $$bPDF 001434314 500__ $$aIncludes index. 001434314 5050_ $$aIntroduction -- Integrated Circuit Fingerprinting -- Novel PUF designs for device Identification -- Authentication Protocols: Standards, limitation and research opportunities -- Hardware-based Authentication Protocols for better physical security -- Energy Efficient Authentication Protocols -- Case study 1: Securing Hardware Supply Chain -- Case study 2: GPS spoofing attack detection and survival. 001434314 506__ $$aAccess limited to authorized users. 001434314 520__ $$aThis book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications. The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival. Provides deep insight into the security threats undermining existing integrated circuit authentication techniques; Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems; Offers a comprehensive summary of existing authentication protocols and their limitations; Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption; Includes detailed case studies on the emerging applications of IC authentication schemes. 001434314 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed March 12, 2021). 001434314 650_0 $$aIntegrated circuits$$xVerification. 001434314 650_0 $$aEmbedded computer systems. 001434314 650_0 $$aElectronic circuits. 001434314 650_0 $$aComputer engineering. 001434314 650_0 $$aInternet of things. 001434314 650_0 $$aMicroprocessors. 001434314 650_0 $$aComputer organization. 001434314 650_6 $$aCircuits intégrés$$xVérification. 001434314 650_6 $$aSystèmes enfouis (Informatique) 001434314 650_6 $$aCircuits électroniques. 001434314 650_6 $$aOrdinateurs$$xConception et construction. 001434314 650_6 $$aInternet des objets. 001434314 655_0 $$aElectronic books. 001434314 7001_ $$aHalak, Basel,$$eeditor. 001434314 77608 $$iPrint version:$$z3030607682 001434314 852__ $$bebk 001434314 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-60769-2$$zOnline Access$$91397441.1 001434314 909CO $$ooai:library.usi.edu:1434314$$pGLOBAL_SET 001434314 980__ $$aBIB 001434314 980__ $$aEBOOK 001434314 982__ $$aEbook 001434314 983__ $$aOnline 001434314 994__ $$a92$$bISE