Books on the topic 'Hardware Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Hardware Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. Hardware Security Primitives. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-19185-5.
Full textSadeghi, Ahmad-Reza, and David Naccache, eds. Towards Hardware-Intrinsic Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14452-3.
Full textSklavos, Nicolas, Ricardo Chaves, Giorgio Di Natale, and Francesco Regazzoni, eds. Hardware Security and Trust. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44318-8.
Full textHalak, Basel, ed. Hardware Supply Chain Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62707-2.
Full textFarahmandi, Farimah, M. Sazadur Rahman, Sree Ranjani Rajendran, and Mark Tehranipoor. CAD for Hardware Security. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26896-0.
Full textTehranipoor, Mark, ed. Emerging Topics in Hardware Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64448-2.
Full textKatkoori, Srinivas, and Sheikh Ariful Islam, eds. Behavioral Synthesis for Hardware Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-78841-4.
Full textMishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor, eds. Hardware IP Security and Trust. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49025-0.
Full textTehranipoor, Mark, N. Nalla Anandakumar, and Farimah Farahmandi. Hardware Security Training, Hands-on! Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-31034-8.
Full textKelly, Wayne. Security hardware and security system planning for museums. Ottawa, Ont: Canadian Conservation Institute, 1998.
Find full textKelly, Wayne. Security hardware and security system planning for museums. Ottawa: Canadian Conservation Institute, 1998.
Find full textRangarajan, Nikhil, Satwik Patnaik, Johann Knechtel, Shaloo Rakheja, and Ozgur Sinanoglu. The Next Era in Hardware Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-85792-9.
Full textTehranipoor, Mohammad, and Cliff Wang, eds. Introduction to Hardware Security and Trust. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4419-8080-9.
Full textTang, Beng Chiew. Security Engineering of Hardware-Software Interfaces. [New York, N.Y.?]: [publisher not identified], 2018.
Find full textCliff, Wang, and SpringerLink (Online service), eds. Introduction to Hardware Security and Trust. New York, NY: Springer Science+Business Media, LLC, 2012.
Find full textRaj, Balwinder, and Arun Kumar Singh. Nanoelectronic Devices for Hardware and Software Security. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003126645.
Full textSantikellur, Pranesh, and Rajat Subhra Chakraborty. Deep Learning for Computational Problems in Hardware Security. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-4017-0.
Full textPATRANABIS, SIKHAR, and Debdeep Mukhopadhyay, eds. Fault Tolerant Architectures for Cryptography and Hardware Security. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-1387-4.
Full textLast, R. W. PC security: Aprofessional guide to hardware and data protection. Wilmslow: Sigma, 1990.
Find full textVemuri, Ranga, and Suyuan Chen. Split Manufacturing of Integrated Circuits for Hardware Security and Trust. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73445-9.
Full textSakiyama, Kazuo. Security of block ciphers: From algorithm design to hardware implementation. Chichester, West Sussex: John Wiley & Sons Inc., 2015.
Find full textL, Antonakos James, ed. Computer networking from LANs to WANs: Hardware, software and security. Boston, MA: Course Technology, Cengage Learning, 2010.
Find full textInc, ebrary, ed. Zabbix 1.8 network monitoring: Monitor your network's hardware, servers, and Web performance effectively and efficiently. Birmingham, U.K: Packt Pub., 2010.
Find full textGuha, Krishnendu, Sangeet Saha, and Amlan Chakrabarti. Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79701-0.
Full textDertouzos, James N. The economic costs and implications of high-technology hardware theft. Santa Monica, CA: Rand, 1999.
Find full textDube, Roger. Hardware-based computer security techniques to defeat hackers: From biometrics to quantum cryptography. Hoboken, N.J: Wiley, 2008.
Find full textMukhopadhyay, Debdeep, and Rajat Subhra Chakraborty. Hardware Security. Chapman and Hall/CRC, 2014. http://dx.doi.org/10.1201/b17555.
Full textPundir, Nitin, Nidish Vashishta, Mark Tehranipoor, and Farimah Farahmandi. Hardware Security Primitives. Springer International Publishing AG, 2022.
Find full textBlokdyk, Gerardus. Hardware security module: Core. Createspace Independent Publishing Platform, 2017.
Find full textThe Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks. No Starch Press, 2021.
Find full textMishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor. Hardware IP Security and Trust. Springer, 2018.
Find full textTehranipoor, Mark. Emerging Topics in Hardware Security. Springer International Publishing AG, 2022.
Find full textMishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor. Hardware IP Security and Trust. Springer, 2017.
Find full textMishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor. Hardware IP Security and Trust. Springer, 2017.
Find full textKatkoori, Srinivas, and Sheikh Ariful Islam. Behavioral Synthesis for Hardware Security. Springer International Publishing AG, 2021.
Find full text(Editor), Nadia Nedjah, Luiza De Macedo Mourelle (Editor), and Luiza De Macedo Mourelle (Editor), eds. Embedded Cryptographic Hardware: Design & Security. Nova Science Publishers, 2006.
Find full textBhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection through Obfuscation. Springer, 2018.
Find full textBhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection through Obfuscation. Springer, 2017.
Find full textBhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection Through Obfuscation. Springer, 2017.
Find full textChakraborty, Rajat Subhra, and Debdeep Mukhopadhyay. Hardware Security: Design, Threats, and Safeguards. Taylor & Francis Group, 2014.
Find full textGunn, Lachlan J., Jan-Erik Ekberg, Hans Liljestrand, Vijayanand Nayani, and N. Asokan. Hardware Platform Security for Mobile Devices. Now Publishers, 2022.
Find full textWang, Cliff, and Mohammad Tehranipoor. Introduction to Hardware Security and Trust. Springer, 2011.
Find full textBhunia, Swarup, and Mark Tehranipoor. Hardware Security: A Hands-On Learning Approach. Elsevier Science & Technology Books, 2018.
Find full text