Compare Prices | Create Shopping Lists with Price Drop Alerts | Set Coupons, Promo Codes & Sales Alerts | Get Access to Exclusive Deals and Much More... All in One Place | Read all about it here

Physically Unclonable Functions (PUFs)

Physically Unclonable Functions (PUFs)

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783031012167
Condition
New
Product Description

Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly used to produce and process both security-critical and privacy-sensitive data, which bear many security and privacy risks. Establishing trust in the underlying devices and making them resistant to software and hardware attacks is a fundamental requirement in many applications and a challenging, yet unsolved, task. Solutions solely based on software can never ensure their own integrity and trustworthiness while resource-constraints and economic factors often prevent the integration of sophisticated security hardware and cryptographic co-processors. In this context, Physically Unclonable Functions (PUFs) are an emerging and promising technology to establish trust in embedded systems with minimal hardware requirements. This book explores the design of trusted embedded systems based on PUFs. Specifically, it focuses on the integration of PUFs into secure and efficient cryptographic protocols that are suitable for a variety of embedded systems. It exemplarily discusses how PUFs can be integrated into lightweight device authentication and attestation schemes, which are popular and highly relevant applications of PUFs in practice. For the integration of PUFs into secure cryptographic systems, it is essential to have a clear view of their properties. This book gives an overview of different approaches to evaluate the properties of PUF implementations and presents the results of a large scale security analysis of different PUF types implemented in application-specific integrated circuits (ASICs). To analyze the security of PUF-based schemes as is common in modern cryptography, it is necessary to have a security framework for PUFs and PUF-based systems. In this book, we give a flavor of the formal modeling of PUFs that is in its beginning and that is still undergoing further refinement in current research. The objective of this book is to provide a comprehensive overview of the current state of secure PUF-based cryptographic system design and the related challenges and limitations. Table of Contents: Preface / Introduction / Basics of Physically Unclonable Functions / Attacks on PUFs and PUF-based Systems / Advanced PUF Concepts / PUF Implementations and Evaluation / PUF-based Cryptographic Protocols / Security Model for PUF-based Systems / Conclusion / Terms and Abbreviations / Bibliography / Authors' Biographies.

Available Colors
Available Sizes
1 Offer Price Range: $19.99 - $19.99
BEST PRICE

Single Product Purchase

$19.99
@ Link.springer.com     BUY Now

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
Contact Store Call Store Contact Support
$19.99 $19.99

$19.99
See Site In stock Visit Store

Similar Products

Innovation in Familienunternehmen

$17.99

Das Planetenmodell der kollaborativen Kreativitt

$59.99

The Modes of Human Rights Literature

$54.99

Large-Scale Regional Water Resources Planning

$109.99

Das Nachrichtenverstndnis junger Menschen

$89.99

Free Radicals, Lipoproteins, and Membrane Lipids

$39.99

Izzy Gizmo by Pip Jones

$8.99

Zukunftsfhige Geschftsmodelle und Werte

$29.99

Grundfragen der Theorie politischer Institutionen

$69.95

Corporate-Compliance-Berichterstattung in Deutschland

$59.99

Cancer Epigenetics

$169.99

The Knowledge Economy in India

$109.99

Cultural and Creative Industries and Regional Development

$129.99

Concurrency Theory

$169.99

Marktwirtschaftliche Umweltpolitik aus kologischer Sicht

$59.99

OPLL

$179.99

Nerve and Muscle

$39.99

Sovereignty and Interpretation of International Norms

$169.99

Frank Knox

$159.99

Perturbative and Non-perturbative Approaches to String Sigma-Models in AdS/CFT

$84.99

Flood Hydrology

$129.00

Youre Wrong, Im Right

$169.99

Soziale Bewegungen in der Mediengesellschaft

$49.99

Bltter fr Technikgeschichte

$59.99

Facility Management

$69.99

Das Spiel: Muster und Metapher der Mediengesellschaft

$39.99

Innovation, Governance and Entrepreneurship: How Do They Evolve in Middle Income Countries?

$139.99

Smart Sensors for Industrial Internet of Things

$149.00

Phylogenomics

$129.99

Physikalische Werkstoffdiagnostik

$69.99

English: The Condition of the Subject

$54.99

The AUN/SEED-Net Joint Regional Conference in Transportation, Energy, and Mechanical Manufacturing E

$249.99

International Shipping

$64.99

Methods of Optimization and Systems Analysis for Problems of Transcomputational Complexity

$54.99

Information Systems: Education, Applications, Research

$60.00

Eltern zwischen Kindertageseinrichtung und Grundschule

$69.99

Intelligent Methods Systems and Applications in Computing, Communications and Control

$169.99

Cyber Threat Intelligence

$129.00

Proceedings of the Third German-Italian Symposium Applications of Mathematics in Industry and Techno

$59.99

JavaScript Frameworks for Modern Web Dev

$39.99