Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 93,74
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Verlag: Springer Nature Switzerland AG, 2022
ISBN 10: 3030788407 ISBN 13: 9783030788407
Sprache: Englisch
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
EUR 114,98
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbHRD. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 140,65
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 413 pages. 9.25x6.10x0.85 inches. In Stock.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 140,29
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Verlag: Springer International Publishing, 2023
ISBN 10: 3030788431 ISBN 13: 9783030788438
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 96,29
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking.Provides a single-source reference to behavioral synthesis for hardware security;Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations;Includes behavioral synthesis techniques for intellectual property protection.
Verlag: Springer International Publishing, Springer Nature Switzerland Feb 2022, 2022
ISBN 10: 3030788407 ISBN 13: 9783030788407
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 139,09
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbBuch. Zustand: Neu. Neuware -This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking.Provides a single-source reference to behavioral synthesis for hardware security;Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations;Includes behavioral synthesis techniques for intellectual property protection.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 416 pp. Englisch.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 196,31
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 413 pages. 9.25x6.10x1.02 inches. In Stock.
Verlag: Springer International Publishing, 2022
ISBN 10: 3030788407 ISBN 13: 9783030788407
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 139,09
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbBuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking.Provides a single-source reference to behavioral synthesis for hardware security;Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations;Includes behavioral synthesis techniques for intellectual property protection.