×







We sell 100% Genuine & New Books only!

Frontiers In Securing Ip Cores Forensic Detective Control And Obfuscation Techniques 2020 Edition at Meripustak

Frontiers In Securing Ip Cores Forensic Detective Control And Obfuscation Techniques 2020 Edition by Anirban Sengupta , Institution of Engineering and Technology

Books from same Author: Anirban Sengupta

Books from same Publisher: Institution of Engineering and Technology

Related Category: Author List / Publisher List


  • Price: ₹ 12662.00/- [ 11.00% off ]

    Seller Price: ₹ 11269.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Anirban Sengupta
    PublisherInstitution of Engineering and Technology
    ISBN9781839530319
    Pages344
    BindingHardbound
    LanguageEnglish
    Publish YearJanuary 2020

    Description

    Institution of Engineering and Technology Frontiers In Securing Ip Cores Forensic Detective Control And Obfuscation Techniques 2020 Edition by Anirban Sengupta

    This book presents advanced forensic detective control and obfuscation techniques for securing hardware IP cores by exploring beyond conventional technologies. The theme is important to researchers in various areas of specialization, because it encompasses the overlapping topics of EDA-CAD, hardware design security, VLSI design, IP core protection, optimization using evolutionary computing, system-on-chip design and finally application specific processor/hardware accelerator design for consumer electronics applications.The book begins by introducing forensic detective control and obfuscation mechanisms for hardware and IP core security. Further chapters cover hardware stenography, digital signature driven hardware authentication, fault-secured IP cores using digital signature-based watermarks, multi-level watermarking, cryptosystem-based multi-variable fingerprinting, multi-phase and hologram-based obfuscation, and security of functionally obfuscated DSP cores.



    Book Successfully Added To Your Cart