001436283 000__ 04121cam\a2200589\i\4500 001436283 001__ 1436283 001436283 003__ OCoLC 001436283 005__ 20230309004018.0 001436283 006__ m\\\\\o\\d\\\\\\\\ 001436283 007__ cr\un\nnnunnun 001436283 008__ 210504s2021\\\\sz\a\\\\ob\\\\001\0\eng\d 001436283 019__ $$a1250090416 001436283 020__ $$a9783030644482$$q(electronic bk.) 001436283 020__ $$a3030644480$$q(electronic bk.) 001436283 020__ $$z3030644472 001436283 020__ $$z9783030644475 001436283 0247_ $$a10.1007/978-3-030-64448-2$$2doi 001436283 035__ $$aSP(OCoLC)1249496997 001436283 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dEBLCP$$dOCLCO$$dOCLCF$$dN$T$$dUKAHL$$dOCLCO$$dOCLCQ$$dCOM$$dOCLCO$$dOCLCQ 001436283 049__ $$aISEA 001436283 050_4 $$aQA76.9.A25 001436283 08204 $$a005.8$$223 001436283 24500 $$aEmerging topics in hardware security /$$cMark Tehranipoor, editor. 001436283 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2021] 001436283 300__ $$a1 online resource (xxviii, 602 pages) :$$billustrations (some color) 001436283 336__ $$atext$$btxt$$2rdacontent 001436283 337__ $$acomputer$$bc$$2rdamedia 001436283 338__ $$aonline resource$$bcr$$2rdacarrier 001436283 504__ $$aIncludes bibliographical references and index. 001436283 5050_ $$aBlockchain-enabled electronics supply chain assurance -- Digital twin with a perspective from manufacturing industry -- Trillion sensors security -- Security of AI hardware systems -- Machine learning in hardware security -- Security assessment of high-level systhesis -- CAD for side-channel leakage assessment -- Post-quantum hardware security -- Post-quantum cryptographic hardware and embedded systems -- Neuromorphic security -- Homomorphic encryption -- Software security with hardware in mind -- Firmware protection -- Security of emerging memory chips -- Security of analog, mixed-signal, and RF devices -- Analog IP protection and evaluation -- Application of optical techniques to hardware assurance -- Computer vision for hardware security -- Asynchronous circuits and their application in hardware security -- Microfluidic device security. 001436283 506__ $$aAccess limited to authorized users. 001436283 520__ $$aThis book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains. The authors are experts in emerging technologies, traditional hardware design, and hardware security and trust. Readers will gain a comprehensive understanding of hardware security problems and how to overcome them through an efficient combination of conventional approaches and emerging technologies, enabling them to design secure, reliable, and trustworthy hardware. Offers a high-level introduction to current hardware security problems; Provides a thorough discussion of a wide variety of emerging topics and technologies (e.g., artificial intelligence, blockchain, and quantum computing) and their applications to hardware security problems; Covers state-of-the-art techniques, as well as ongoing research efforts in emerging technologies in hardware security; Provides guidance and techniques to design and security engineers on protecting their design using emerging technologies. 001436283 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 14, 2021). 001436283 650_0 $$aComputer security. 001436283 650_0 $$aDatabase security. 001436283 650_0 $$aComputer networks$$xSecurity measures. 001436283 650_0 $$aData encryption (Computer science) 001436283 650_0 $$aArtificial intelligence. 001436283 650_6 $$aSécurité informatique. 001436283 650_6 $$aBases de données$$xSécurité$$xMesures. 001436283 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures. 001436283 650_6 $$aChiffrement (Informatique) 001436283 650_6 $$aIntelligence artificielle. 001436283 655_0 $$aElectronic books. 001436283 7001_ $$aTehranipoor, Mohammad H.,$$d1974-$$eeditor. 001436283 77608 $$iPrint version:$$z9783030644475$$w(OCoLC)1202059491 001436283 852__ $$bebk 001436283 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-64448-2$$zOnline Access$$91397441.1 001436283 909CO $$ooai:library.usi.edu:1436283$$pGLOBAL_SET 001436283 980__ $$aBIB 001436283 980__ $$aEBOOK 001436283 982__ $$aEbook 001436283 983__ $$aOnline 001436283 994__ $$a92$$bISE