Compare Prices | Create Shopping Lists with Price Drop Alerts | Set Coupons, Promo Codes & Sales Alerts | Get Access to Exclusive Deals and Much More... All in One Place | Read all about it here

Physically Unclonable Functions (PUFs)

Physically Unclonable Functions (PUFs)

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783031012167
Condition
New
Product Description

Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly used to produce and process both security-critical and privacy-sensitive data, which bear many security and privacy risks. Establishing trust in the underlying devices and making them resistant to software and hardware attacks is a fundamental requirement in many applications and a challenging, yet unsolved, task. Solutions solely based on software can never ensure their own integrity and trustworthiness while resource-constraints and economic factors often prevent the integration of sophisticated security hardware and cryptographic co-processors. In this context, Physically Unclonable Functions (PUFs) are an emerging and promising technology to establish trust in embedded systems with minimal hardware requirements. This book explores the design of trusted embedded systems based on PUFs. Specifically, it focuses on the integration of PUFs into secure and efficient cryptographic protocols that are suitable for a variety of embedded systems. It exemplarily discusses how PUFs can be integrated into lightweight device authentication and attestation schemes, which are popular and highly relevant applications of PUFs in practice. For the integration of PUFs into secure cryptographic systems, it is essential to have a clear view of their properties. This book gives an overview of different approaches to evaluate the properties of PUF implementations and presents the results of a large scale security analysis of different PUF types implemented in application-specific integrated circuits (ASICs). To analyze the security of PUF-based schemes as is common in modern cryptography, it is necessary to have a security framework for PUFs and PUF-based systems. In this book, we give a flavor of the formal modeling of PUFs that is in its beginning and that is still undergoing further refinement in current research. The objective of this book is to provide a comprehensive overview of the current state of secure PUF-based cryptographic system design and the related challenges and limitations. Table of Contents: Preface / Introduction / Basics of Physically Unclonable Functions / Attacks on PUFs and PUF-based Systems / Advanced PUF Concepts / PUF Implementations and Evaluation / PUF-based Cryptographic Protocols / Security Model for PUF-based Systems / Conclusion / Terms and Abbreviations / Bibliography / Authors' Biographies.

Available Colors
Available Sizes
1 Offer Price Range: $19.99 - $19.99
BEST PRICE

Single Product Purchase

$18.00
@ Link.springer.com with extra coupon Get Coupon & BUY

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
Contact Store Call Store Contact Support
$19.99 $19.99

10% OFF
This deals requires coupon Get Code Here
$18.00
See Site In stock Visit Store

Similar Products

The Long March to Capitalism

$84.99

Modern Treatment of Severe Burns

$84.99

Ten Years of Progress in GW/P Body Research

$129.00

Das neue Reisekostenrecht

$59.99

Developing Anti-Racist Practices in the Helping Professions: Inclusive Theory, Pedagogy, and Applica

$139.99

Industrielle Produktionsentwicklung

$39.99

Management der frhen Innovationsphasen

$64.99

Wireless and Satellite Systems

$54.99

Food Traceability in Jordan

$39.99

Quantum Communication Networks

$99.99

Berichte des Ausschusses fr Versuche im Eisenbau

$59.99

Macht - Eigensinn - Engagement

$39.99

SQL Server Data Automation Through Frameworks

$44.99

Parting the Cosmic Veil

$37.99

Basic Resuscitation and Primary Care

$39.99

Magnetically Activated and Guided Isotope Separation

$109.99

Index and Query Methods in Road Networks

$109.99

Front Line Public Diplomacy

$54.99

Genetic Programming for Production Scheduling

$169.99

Irans Kampf um Wasser

$59.99

Global Health Partnerships

$54.99

Sicca-Syndrom

$39.99

If You Give a Mouse: Merry Christmas, Mouse!

$3.71

Mechanik

$34.99

The Proceedings of the 18th Annual Conference of China Electrotechnical Society

$299.00

Chiplet Design and Heterogeneous Integration Packaging

$199.99

Beitrge zur Geschichte des Dieselmotors

$74.99

Peppa Pig: Peppa Goes Ice Skating

$4.49

Kernenergie in sterreich

$44.99

The Formation of Civil Society in Modern Iran

$39.99

Thermodynamics of Soil Nutrient Bioavailability

$159.99

Understanding the Biological Basis of Behavior

$79.99

Broadband Communications, Networks, and Systems

$64.99

Fachenglisch fr Gesundheitsberufe

$34.99

Elliptic Functions and Transcendence

$29.99

Social Big Data Analytics

$119.00

The Fusion of Internet of Things, Artificial Intelligence, and Cloud Computing in Health Care

$179.99

Problems and Snapshots from the World of Probability

$54.99

Contesting Stories of Childhood Sexual Abuse

$39.99

Die Immunantwort

$69.99