Integrated Circuit Authentication Hardware Trojans and Counterfeit Detection /
This book provides readers with a comprehensive introduction to hardware Trojans. The authors explain the hardware Trojan taxonomy in detail, while delivering deep understanding of the potential impacts throughout the integrated circuit (IC) lifecycle. While discussing the shortcomings of current,...
Autor principal: | Tehranipoor, Mohammad |
---|---|
Otros Autores: | Salmani, Hassan, Zhang, Xuehui |
Formato: | Libro electrónico |
Lenguaje: | Inglés |
Publicado: |
Cham :
Springer International Publishing : Imprint: Springer,
2014.
|
Materias: | |
Acceso en línea: | http://dx.doi.org/10.1007/978-3-319-00816-5 |
Aporte de: | Registro referencial: Solicitar el recurso aquí |
Ejemplares similares
-
Protecting Chips Against Hold Time Violations Due to Variability
por: Neuberger, Gustavo
Publicado: (2014) -
Trace-Based Post-Silicon Validation for VLSI Circuits
por: Liu, Xiao
Publicado: (2014) -
Exploring Memory Hierarchy Design with Emerging Memory Technologies
por: Sun, Guangyu
Publicado: (2014) -
Design-for-Test and Test Optimization Techniques for TSV-based 3D Stacked ICs
por: Noia, Brandon
Publicado: (2014) -
Embedded Memory Design for Multi-Core and Systems on Chip
por: Mohammad, Baker
Publicado: (2014)