LEADER 01337nam a22003011 4500 001 991002666099707536 008 070719s2004 it 000 0 ita d 020 $a9788841259603 035 $ab13562174-39ule_inst 040 $aDip.to Scienze pedagogiche$bita 082 0 $a158 100 1 $aCastelnuovo , Gianluca$0626157 245 13$aLa PNL nella formazione /$cGianluca Castelnuovo, Andrea Ceriani, Veronica Colantonio 260 $aMilano :$bDe Vecchi,$c2004 300 $a191 p.$c21 cm 500 $aIn cop.: Le tecniche, gli schemi e i casi pratici per la gestione dei gruppi 504 $aBibliografia: p. 188-189 650 4$aProgrammazione neurolinguistica 650 4$aApprendimento$xMetodi 650 4$aFormazione professionale$xMetodi 700 1 $aColantonio, Veronica$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0738738 700 1 $aCeriani, Andrea$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0541299 907 $a.b13562174$b28-01-14$c19-07-07 912 $a991002666099707536 945 $aLE022 158 CAS02.01$g1$i2022000123945$lle022$nLE022/BOCHICCHIO/2007$nrestituito dal docente, disponibile in biblioteca 2/11/11$op$pE14.50$q-$rl$s- $t0$u5$v0$w5$x0$y.i14537400$z28-08-07 996 $aPNL nella formazione$91463341 997 $aUNISALENTO 998 $ale022$b19-07-07$cm$da $e-$fita$git $h3$i0 LEADER 03593nam 22006015 450 001 9910635396903321 005 20230823195829.0 010 $a3-031-19185-4 024 7 $a10.1007/978-3-031-19185-5 035 $a(MiAaPQ)EBC7158080 035 $a(Au-PeEL)EBL7158080 035 $a(CKB)25732551800041 035 $a(DE-He213)978-3-031-19185-5 035 $a(PPN)272269565 035 $a(EXLCZ)9925732551800041 100 $a20221215d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aHardware Security Primitives /$fby Mark Tehranipoor, Nitin Pundir, Nidish Vashistha, Farimah Farahmandi 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (356 pages) 311 08$aPrint version: Tehranipoor, Mark Hardware Security Primitives Cham : Springer International Publishing AG,c2023 9783031191848 320 $aIncludes bibliographical references and index. 327 $aIntroduction -- Hardware Security Primitives and their Applications -- Racetrack PUF -- TERO PUF -- Direct Characterization PUF -- Volatile Memory Based PUF -- Emerging Memory Based PUF -- Extrinsic Characterization of PUF -- Radio PUFs and CoAs -- Optical PUFs -- True Random Number Generators -- Hardware Camouflaging -- Temper Detection Methods -- Embedded Watermarking -- Counterfeit and Recycled IC Detection -- Package-Level Counterfeit IC Detection -- Side Channels Protection in Cryptographic Hardware -- Fault Injection Resistant Cryptographic Hardware -- Energy and Performance Optimization for Cryptography -- Lightweight Cryptography -- Post-Quantum Cryptography -- Virtual Proof of Reality -- Analog Security. 330 $aThis book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern devices. Readers will be enabled to understand the various methods for exploiting intrinsic manufacturing and temporal variations in silicon devices to create strong security primitives and solutions. This book will benefit SoC designers and researchers in designing secure, reliable, and trustworthy hardware. Provides guidance and security engineers for protecting their hardware designs; Covers a variety digital and analog hardware security primitives and applications for securing modern devices; Helps readers understand PUF, TRNGs, silicon odometer, and cryptographic hardware design for system security. 606 $aElectronic circuits 606 $aElectronic circuit design 606 $aMicroprocessors 606 $aComputer architecture 606 $aElectronic Circuits and Systems 606 $aElectronics Design and Verification 606 $aProcessor Architectures 615 0$aElectronic circuits. 615 0$aElectronic circuit design. 615 0$aMicroprocessors. 615 0$aComputer architecture. 615 14$aElectronic Circuits and Systems. 615 24$aElectronics Design and Verification. 615 24$aProcessor Architectures. 676 $a929.605 676 $a005.8 700 $aTehranipoor$b Mohammad H.$f1974-$01350630 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910635396903321 996 $aHardware security primitives$93089244 997 $aUNINA