(Ilmumisaeg: 22-Jul-2022, PDF+DRM, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031045127)
This book provides a detailed overview of detection algorithms for multiple-input multiple-output (MIMO) communications systems focusing on their hardware realisation. The book begins by analysing the maximum likelihood detector, which provides the o...Loe edasi...
(Ilmumisaeg: 22-Jul-2022, EPUB+DRM, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031045127)
This book provides a detailed overview of detection algorithms for multiple-input multiple-output (MIMO) communications systems focusing on their hardware realisation. The book begins by analysing the maximum likelihood detector, which provides the o...Loe edasi...
This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It...Loe edasi...
This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It...Loe edasi...
This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack,...Loe edasi...
This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack,...Loe edasi...
This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies...Loe edasi...
This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies...Loe edasi...
This book provides comprehensive coverage of the latest research into integrated circuits ageing, explaining the causes of this phenomenon, describing its effects on electronic systems, and providing mitigation techniques to build ageing-resili...Loe edasi...
This book provides comprehensive coverage of the latest research into integrated circuits ageing, explaining the causes of this phenomenon, describing its effects on electronic systems, and providing mitigation techniques to build ageing-resili...Loe edasi...
(Ilmumisaeg: 18-Apr-2018, PDF+DRM, Kirjastus: Springer International Publishing AG, ISBN-13: 9783319768045)
This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and...Loe edasi...
(Ilmumisaeg: 18-Apr-2018, EPUB+DRM, Kirjastus: Springer International Publishing AG, ISBN-13: 9783319768045)
This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and...Loe edasi...