Muutke küpsiste eelistusi

E-raamat: Statistical Trend Analysis of Physically Unclonable Functions: An Approach via Text Mining [Taylor & Francis e-raamat]

, , (Waseda University, Toyko, Japan), (The University of North Carolina at Greensboro, USA),
  • Formaat: 160 pages, 12 Tables, black and white; 44 Line drawings, black and white; 44 Illustrations, black and white
  • Ilmumisaeg: 26-Mar-2021
  • Kirjastus: CRC Press
  • ISBN-13: 9781003167105
  • Taylor & Francis e-raamat
  • Hind: 69,23 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Tavahind: 98,90 €
  • Säästad 30%
  • Formaat: 160 pages, 12 Tables, black and white; 44 Line drawings, black and white; 44 Illustrations, black and white
  • Ilmumisaeg: 26-Mar-2021
  • Kirjastus: CRC Press
  • ISBN-13: 9781003167105
"Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals. They have found many applications in the Internet of Things (IoT), authentication systems, FPGAindustry, several other areas in communications and related technologies, and many commercial products. Statistical Trend Analysis of Physically Unclonable Functions first presents a review on cryptographic hardware and hardware-assisted cryptography. The review highlights PUF as a mega trend in research on cryptographic hardware design. Afterwards, the authors present a combined survey and research work on PUFs using a systematic approach. As part of the survey aspect, a state-of-the-art analysis is presented as well as a taxonomy on PUFs, a life cycle, and an established ecosystem for the technology. In another part of the survey, the evolutionary history of PUFs is examined, and strategies for further research in this area are suggested"--

Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals. They have found many applications in the Internet of Things (IoT), authentication systems, FPGA industry, several other areas in communications and related technologies, and many commercial products.

Statistical Trend Analysis of Physically Unclonable Functions first presents a review on cryptographic hardware and hardware-assisted cryptography. The review highlights PUF as a mega trend in research on cryptographic hardware design. Afterwards, the authors present a combined survey and research work on PUFs using a systematic approach. As part of the survey aspect, a state-of-the-art analysis is presented as well as a taxonomy on PUFs, a life cycle, and an established ecosystem for the technology. In another part of the survey, the evolutionary history of PUFs is examined, and strategies for further research in this area are suggested.

In the research side, this book presents a novel approach for trend analysis that can be applied to any technology or research area. In this method, a text mining tool is used which extracts 1020 keywords from the titles of the sample papers. Then, a classifying tool classifies the keywords into 295 meaningful research topics. The popularity of each topic is then numerically measured and analyzed over the course of time through a statistical analysis on the number of research papers related to the topic as well as the number of their citations. The authors identify the most popular topics in four different domains; over the history of PUFs, during the recent years, in top conferences, and in top journals. The results are used to present an evolution study as well as a trend analysis and develop a roadmap for future research in this area. This method gives an automatic popularity-based statistical trend analysis which eliminates the need for passing personal judgments about the direction of trends, and provides concrete evidence to the future direction of research on PUFs. Another advantage of this method is the possibility of studying a whole lot of existing research works (more than 700 in this book).

This book will appeal to researchers in text mining, cryptography and ‘Internet of Things’ working in the field of hardware security.

Book Description ix
About the Authors xi
Chapter 1 Introduction
1(6)
Chapter 2 Cryptographic Hardware and Hardware- Assisted Cryptography
7(34)
2.1 Existing Surveys
8(2)
2.2 Design
10(23)
2.2.1 Cryptographic Primitives
10(3)
2.2.2 Cryptographic Hardware
13(12)
2.2.3 Hardware-Assisted Ciphers
25(7)
2.2.4 Automatic Design and Synthesis
32(1)
2.2.5 Design Objectives
33(1)
2.3 Implementation
33(4)
2.3.1 Prototyping
33(1)
2.3.2 Implementation Technologies
34(1)
2.3.3 Implementation Goals and Challenges
35(2)
2.4 Evaluation
37(4)
2.4.1 Security Evaluation
37(2)
2.4.2 Simulation and Performance Benchmarking
39(2)
Chapter 3 PUFs in Industry, Education Programs and Books
41(4)
3.1 Historical Background
41(1)
3.2 PUF In Industry
41(1)
3.3 PUF In Education Programs
42(1)
3.4 PUF In Books
42(3)
Chapter 4 Preliminary Discussions
45(10)
4.1 Related Works: A Survey On Surveys
45(3)
4.2 Motivations
48(2)
4.3 Methodology
50(2)
4.4 Work Space
52(3)
Chapter 5 The Classification Tree and Popularities
55(20)
5.1 First-Level Classification And Life Cycle
55(2)
5.2 Design
57(6)
5.2.1 Modeling
58(1)
5.2.2 Design Objectives
58(3)
5.2.3 Component Design
61(1)
5.2.4 Post-Process, Expansion, Standardization and Alternatives
62(1)
5.3 Implementation
63(2)
5.4 Operation
65(8)
5.4.1 Ecosystem
66(6)
5.4.2 Interfaces
72(1)
5.5 Evaluation And Production
73(2)
Chapter 6 Trend Analysis
75(10)
6.1 Top Topics
75(8)
6.1.1 The Most Popular Topics during the History
76(1)
6.1.2 The Most Popular Topics in Top Conferences
77(1)
6.1.3 Popular Topics in Top Journals
77(2)
6.1.4 Popular Topics in Recent Years
79(4)
6.2 Evolution Study
83(2)
Chapter 7 Future Roadmap
85(10)
7.1 Trends
87(7)
7.2 Conclusions And Further Work
94(1)
Bibliography 95(50)
Index 145
Behrouz Zolfaghari is currently a postdoctoral fellow at Indian Institute of Technology Guwahati. His research interests include hardware-oriented cryptography, information-theoretic cryptography, information theory, VLSI design and discrete mathematics.

Khodakhast Bibak is an Assistant Professor at the Department of Computer Science and Software Engineering at Miami University. Previously, he was a Postdoctoral Research Associate (September 2017 - August 2018) in the Coordinated Science Laboratory at the University of Illinois at Urbana-Champaign. Before this, Khodakhast was a Postdoctoral Research Fellow (May-August 2017) at the Department of Computer Science, University of Victoria, from where he also received his PhD (April 2017). He earned a Master of Mathematics degree (April 2013) at the Department of Combinatorics and Optimization, University of Waterloo, where he was also a member of the Centre for Applied Cryptographic Research (CACR). Khodakhasts research interests are Cybersecurity, Applied Cryptography, Information Theory, Communications, Quantum Information Science (QIS), and related areas.

Takeshi Koshiba received the PhD degree from Tokyo Institute of Technology. He is a full professor at the Department of Mathematics, the Faculty of Education and Integrated Arts and Sciences, Waseda University, Japan. His interests include theoretical and applied cryptography, the randomness in algorithms, and quantum computing and cryptography.

Hamid R. Nemati is a full Professor of Information Systems at the University of North Carolina at Greensboro. He received his PhD from the University of Georgia in Information Technology and Management Science and his MBA from The University of Massachusetts. He is internationally recognized for his research in various aspects of Information Technology, including data analytics, big data, information security and privacy, organizational and behavioral aspects of Information Technology development and use. He has extensive professional experience as a developer, an analyst and project leader and has been a consultant for numerous major corporations. He has published nine books and over 120 peer reviewed academic publications in various premier scholarly and professional journals and conference proceedings.

Pinaki Mitra is currently an associate professor at Department of Computer Science & Engineering, IIT Guwahati. He obtained his B. Tech in Computer Science and Engineering from Jadavpur University, Kolkata in 1987, India and his M. Tech in Computer Science and Engineering from Indian Institute of Science Bangalore, India in 1989. Finally, he obtained his Ph. D from Simon Fraser University, Canada in 1994. He worked on a project at Jadavpur University, department of Computer Science and Engineering. Subsequently he joined National Institute of Management, Kolkata, and served as an assistant professor. He joined IIT Guwahati in December, 2004. His research interest includes Cryptography, Network Security, Computer Graphics, Multimedia and Machine Learning.