|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Kasem Khalil , Haytham Idriss , Tarek Idriss , Magdy BayoumiPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: 2025 ed. ISBN: 9783031763274ISBN 10: 3031763270 Pages: 152 Publication Date: 08 January 2025 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsChapter 1 Introduction and Background.- Chapter 2 Exploring Classic Security Attacks and Hardware Intricacies.- Chapter 3 Hardware Security Challenges.- Chapter 4 Security in Resource-Constrained IoT Devices.- Chapter 5 Physically Unclonable Functions.- Chapter 6 PUF: Security Threats.- Chapter 7 PUF Performance Testing and Evaluation.- Chapter 8 Improving the PUF’s Reliability.- Chapter 9 The Right Fit to your Device and Application.- Chapter 10 Advanced PUF designs.- Chapter 11 Lightweight PUF Protocols.ReviewsAuthor InformationDr. Kasem Khalil is an assistant professor in the Department of Electrical and Computer Engineering, University of Mississippi. Haytham Idriss is an Assistant Professor in the Department of Computer Science, at the Purdue University Fort Wayne. Tarek Idriss is an Associate Professor in the Department of Computer Science, at Western Washington University. Dr. Magdy A. Bayoumi is Director of The Center for Advanced Computer Studies (CACS), and Department Head of the Computer Science Department at the University of Louisiana at Lafayette (UL Lafayette). He is also the Z.L. Loflin Eminent Scholar Endowed Chair Professor in Computer Science. Tab Content 6Author Website:Countries AvailableAll regions |