Anbieter: Universitätsbuchhandlung Herta Hold GmbH, Berlin, Deutschland
XIII, 228 p. Hardcover. Versand aus Deutschland / We dispatch from Germany via Air Mail. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. Sprache: Englisch.
Anbieter: SpringBooks, Berlin, Deutschland
Erstausgabe
Hardcover. Zustand: Very Good. 1. Auflage. Unread, with a mimimum of shelfwear.
Sprache: Englisch
Verlag: LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659636894 ISBN 13: 9783659636899
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. VLSI Design of ECG Monitor from Concept to Silicon | Basel Halak | Taschenbuch | 76 S. | Englisch | 2014 | LAP LAMBERT Academic Publishing | EAN 9783659636899 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.
Zustand: New.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing Feb 2019, 2019
ISBN 10: 3030082938 ISBN 13: 9783030082932
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and existing countermeasures.This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 272 pp. Englisch.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing, 2019
ISBN 10: 3030082938 ISBN 13: 9783030082932
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and existing countermeasures.This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.
Sprache: Englisch
Verlag: Springer International Publishing, 2022
ISBN 10: 3030607712 ISBN 13: 9783030607715
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival.Provides deep insight into the security threats undermining existing integrated circuit authentication techniques;Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems;Offers a comprehensive summary of existing authentication protocols and their limitations;Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption;Includes detailed case studies on the emerging applications of IC authentication schemes.
Zustand: New.
Sprache: Englisch
Verlag: Springer, Berlin|Springer International Publishing|Springer, 2023
ISBN 10: 3030941809 ISBN 13: 9783030941802
Anbieter: moluna, Greven, Deutschland
EUR 92,27
Anzahl: Mehr als 20 verfügbar
In den WarenkorbKartoniert / Broschiert. Zustand: New.
Sprache: Englisch
Verlag: Springer, Berlin|Springer International Publishing|Springer, 2023
ISBN 10: 3030941779 ISBN 13: 9783030941772
Anbieter: moluna, Greven, Deutschland
EUR 92,27
Anzahl: Mehr als 20 verfügbar
In den WarenkorbGebunden. Zustand: New.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 139,40
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 171 pages. 9.25x6.10x0.55 inches. In Stock.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 139,56
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 203 pages. 9.25x6.10x0.71 inches. In Stock.
Sprache: Englisch
Verlag: Springer International Publishing, 2020
ISBN 10: 3030237834 ISBN 13: 9783030237837
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides comprehensive coverage of the latest research into integrated circuits' ageing, explaining the causes ofthis phenomenon, describing its effects on electronic systems, and providing mitigation techniques to build ageing-resilient circuits.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 140,60
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 269 pages. 9.25x6.10x0.83 inches. In Stock.
Sprache: Englisch
Verlag: Springer International Publishing, Springer Nature Switzerland Jul 2022, 2022
ISBN 10: 3031045114 ISBN 13: 9783031045110
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -This book provides a detailed overview of detection algorithms for multiple-input multiple-output (MIMO) communications systems focusing on their hardware realisation. The book begins by analysing the maximum likelihood detector, which provides the optimal bit error rate performance in an uncoded communications system. However, the maximum likelihood detector experiences a high complexity that scales exponentially with the number of antennas, which makes it impractical for real-time communications systems. The authors proceed to discuss lower-complexity detection algorithms such as zero-forcing, sphere decoding, and the K-best algorithm, with the aid of detailed algorithmic analysis and several MATLAB code examples. Furthermore, different design examples of MIMO detection algorithms and their hardware implementation results are presented and discussed. Finally, an ASIC design flow for implementing MIMO detection algorithms in hardware is provided, including the system simulation andmodelling steps and register transfer level modelling using hardware description languages.Provides an overview of MIMO detection algorithms and discusses their corresponding hardware implementations in detail;Highlights architectural considerations of MIMO detectors in achieving low power consumption and high throughput;Discusses design tradeoffs that will guide readers¿ efforts when implementing MIMO algorithms in hardware;Describes a broad range of implementations of different MIMO detectors, enabling readers to make informed design decisions based on their application requirements.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 172 pp. Englisch.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing Apr 2018, 2018
ISBN 10: 3319768034 ISBN 13: 9783319768038
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and existing countermeasures.This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 272 pp. Englisch.
Sprache: Englisch
Verlag: Springer International Publishing, 2023
ISBN 10: 3031045149 ISBN 13: 9783031045141
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides a detailed overview of detection algorithms for multiple-input multiple-output (MIMO) communications systems focusing on their hardware realisation. The book begins by analysing the maximum likelihood detector, which provides the optimal bit error rate performance in an uncoded communications system. However, the maximum likelihood detector experiences a high complexity that scales exponentially with the number of antennas, which makes it impractical for real-time communications systems. The authors proceed to discuss lower-complexity detection algorithms such as zero-forcing, sphere decoding, and the K-best algorithm, with the aid of detailed algorithmic analysis and several MATLAB code examples. Furthermore, different design examples of MIMO detection algorithms and their hardware implementation results are presented and discussed. Finally, an ASIC design flow for implementing MIMO detection algorithms in hardware is provided, including the system simulation andmodelling steps and register transfer level modelling using hardware description languages.Provides an overview of MIMO detection algorithms and discusses their corresponding hardware implementations in detail;Highlights architectural considerations of MIMO detectors in achieving low power consumption and high throughput;Discusses design tradeoffs that will guide readers' efforts when implementing MIMO algorithms in hardware;Describes a broad range of implementations of different MIMO detectors, enabling readers to make informed design decisions based on their application requirements.
Sprache: Englisch
Verlag: Springer International Publishing, 2022
ISBN 10: 3031045114 ISBN 13: 9783031045110
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides a detailed overview of detection algorithms for multiple-input multiple-output (MIMO) communications systems focusing on their hardware realisation. The book begins by analysing the maximum likelihood detector, which provides the optimal bit error rate performance in an uncoded communications system. However, the maximum likelihood detector experiences a high complexity that scales exponentially with the number of antennas, which makes it impractical for real-time communications systems. The authors proceed to discuss lower-complexity detection algorithms such as zero-forcing, sphere decoding, and the K-best algorithm, with the aid of detailed algorithmic analysis and several MATLAB code examples. Furthermore, different design examples of MIMO detection algorithms and their hardware implementation results are presented and discussed. Finally, an ASIC design flow for implementing MIMO detection algorithms in hardware is provided, including the system simulation andmodelling steps and register transfer level modelling using hardware description languages.Provides an overview of MIMO detection algorithms and discusses their corresponding hardware implementations in detail;Highlights architectural considerations of MIMO detectors in achieving low power consumption and high throughput;Discusses design tradeoffs that will guide readers' efforts when implementing MIMO algorithms in hardware;Describes a broad range of implementations of different MIMO detectors, enabling readers to make informed design decisions based on their application requirements.
Sprache: Englisch
Verlag: Springer International Publishing, 2018
ISBN 10: 3319768034 ISBN 13: 9783319768038
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and existing countermeasures.This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing Jan 2021, 2021
ISBN 10: 3030607682 ISBN 13: 9783030607685
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival.Provides deep insight into the security threats undermining existing integrated circuit authentication techniques;Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems;Offers a comprehensive summary of existing authentication protocols and their limitations;Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption;Includes detailed case studies on the emerging applications of IC authentication schemes.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 204 pp. Englisch.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 150,57
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 175 pages. 9.25x6.10x0.38 inches. In Stock.
Sprache: Englisch
Verlag: Springer International Publishing, 2021
ISBN 10: 3030607682 ISBN 13: 9783030607685
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival.Provides deep insight into the security threats undermining existing integrated circuit authentication techniques;Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems;Offers a comprehensive summary of existing authentication protocols and their limitations;Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption;Includes detailed case studies on the emerging applications of IC authentication schemes.
Zustand: New.
Sprache: Englisch
Verlag: Springer International Publishing, 2023
ISBN 10: 3030941809 ISBN 13: 9783030941802
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities.
Sprache: Englisch
Verlag: Springer International Publishing, 2022
ISBN 10: 3030941779 ISBN 13: 9783030941772
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 166,97
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 244 pages. 9.25x6.10x0.87 inches. In Stock.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing Okt 2019, 2019
ISBN 10: 303023780X ISBN 13: 9783030237806
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -This book provides comprehensive coverage of the latest research into integrated circuits¿ ageing, explaining the causes of this phenomenon, describing its effects on electronic systems, and providing mitigation techniques to build ageing-resilient circuits.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 244 pp. Englisch.
Sprache: Englisch
Verlag: Springer International Publishing, 2019
ISBN 10: 303023780X ISBN 13: 9783030237806
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides comprehensive coverage of the latest research into integrated circuits' ageing, explaining the causes ofthis phenomenon, describing its effects on electronic systems, and providing mitigation techniques to build ageing-resilient circuits.
Zustand: New.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 180,27
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 217 pages. 9.25x6.25x0.75 inches. In Stock.