Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Physically unclonable functions (PUFs) : (Record no. 562112)

000 -LEADER
fixed length control field 06485nam a2200685 i 4500
001 - CONTROL NUMBER
control field 7007874
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200413152916.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m eo d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150117s2015 caua foab 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781627055109
Qualifying information ebook
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781627055093
Qualifying information print
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.2200/S00622ED1V01Y201412SPT012
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)swl00404602
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)900341026
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number W236 2015
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Wachsmann, Christian.,
Relator term author.
245 10 - TITLE STATEMENT
Title Physically unclonable functions (PUFs) :
Remainder of title applications, models, and future directions /
Statement of responsibility, etc. Christian Wachsmann, Ahmad-Reza Sadeghi.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) :
Name of producer, publisher, distributor, manufacturer Morgan & Claypool,
Date of production, publication, distribution, manufacture, or copyright notice 2015.
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (ix, 81 pages) :
Other physical details illustrations.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Synthesis lectures on information security, privacy, & trust,
International Standard Serial Number 1945-9750 ;
Volume/sequential designation # 12
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat Reader.
500 ## - GENERAL NOTE
General note Part of: Synthesis digital library of engineering and computer science.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 65-79).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2. Basics of physically unclonable functions -- 2.1 PUF concept, properties, and assumptions -- 2.2 PUF types -- 2.2.1 Delay-based PUFs -- 2.2.2 Memory-based PUFs -- 2.2.3 Coating PUFs -- 2.2.4 Non-electric PUFs -- 2.3 Noise compensation and privacy amplification --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3. Attacks on PUFs and PUF-based systems -- 3.1 Emulation attacks -- 3.2 Side channel attacks -- 3.3 Fault injection attacks -- 3.4 Invasive attacks --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4. Advanced PUF concepts -- 4.1 Controlled PUFs -- 4.2 Publicly verifiable and emulatable PUFs -- 4.3 Reconfigurable PUFs --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5. PUF implementations and evaluation -- 5.1 PUF implementations in ASIC -- 5.2 Evaluation methodology -- 5.2.1 Robustness analysis -- 5.2.2 Unpredictability analysis -- 5.3 Evaluation results -- 5.3.1 Robustness results -- 5.3.2 Unpredictability results -- 5.3.3. Discussion -- 5.4 Summary --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6. PUF-based cryptographic protocols -- 6.1 Lightweight authentication based on PUFs -- 6.1.1 Literature overview of PUF-based device authentication -- 6.1.2 Protocol description and specification -- 6.1.3 Security analysis -- 6.2 PUF-based attestation -- 6.2.1 Protocol description and specification -- 6.2.2 Security analysis --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 7. Security model for PUF-based systems -- 7.1 Literature overview of PUF security models -- 7.2 Framework for physical functions -- 7.2.1 Background and rationale -- 7.2.2 Formalization -- 7.3 Robustness -- 7.3.1 Rationale -- 7.3.2 Formalization -- 7.4 Physical unclonability -- 7.4.1 Rationale -- 7.4.2 Formalization -- 7.5 Unpredictability -- 7.5.1 Rationale -- 7.5.2 Formalization -- 7.6 Conclusion --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 8. Conclusion -- Terms and abbreviations -- Bibliography -- Authors' biographies.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Abstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0# - CITATION/REFERENCES NOTE
Name of source Compendex
510 0# - CITATION/REFERENCES NOTE
Name of source INSPEC
510 0# - CITATION/REFERENCES NOTE
Name of source Google scholar
510 0# - CITATION/REFERENCES NOTE
Name of source Google book search
520 3# - SUMMARY, ETC.
Summary, etc. Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly used to produce and process both security-critical and privacy-sensitive data, which bear many security and privacy risks. Establishing trust in the underlying devices and making them resistant to software and hardware attacks is a fundamental requirement in many applications and a challenging, yet unsolved, task. Solutions solely based on software can never ensure their own integrity and trustworthiness while resource-constraints and economic factors often prevent the integration of sophisticated security hardware and cryptographic co-processors. In this context, Physically Unclonable Functions (PUFs) are an emerging and promising technology to establish trust in embedded systems with minimal hardware requirements. This book explores the design of trusted embedded systems based on PUFs. Specifically, it focuses on the integration of PUFs into secure and efficient cryptographic protocols that are suitable for a variety of embedded systems. It exemplarily discusses how PUFs can be integrated into lightweight device authentication and attestation schemes, which are popular and highly relevant applications of PUFs in practice. For the integration of PUFs into secure cryptographic systems, it is essential to have a clear view of their properties. This book gives an overview of different approaches to evaluate the properties of PUF implementations and presents the results of a large scale security analysis of different PUF types implemented in application-specific integrated circuits (ASICs). To analyze the security of PUF-based schemes as is common in modern cryptography, it is necessary to have a security framework for PUFs and PUF-based systems. In this book, we give a flavor of the formal modeling of PUFs that is in its beginning and that is still undergoing further refinement in current research. The objective of this book is to provide a comprehensive overview of the current state of secure PUF-based cryptographic system design and the related challenges and limitations.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Title from PDF title page (viewed on January 17, 2015).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data structures (Computer science)
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Physically Unclonable Functions (PUFs)
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term physical security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term embedded security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term lightweight authentication
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term PUF-based remote attestation
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sadeghi, Ahmad-Reza.,
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781627055093
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis digital library of engineering and computer science.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis lectures on information security, privacy, and trust ;
Volume/sequential designation # 12.
International Standard Serial Number 1945-9750
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier http://ieeexplore.ieee.org/servlet/opac?bknumber=7007874
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Date acquired Barcode Date last seen Price effective from Koha item type
        PK Kelkar Library, IIT Kanpur PK Kelkar Library, IIT Kanpur 2020-04-13 EBKE612 2020-04-13 2020-04-13 E books

Powered by Koha