Suche einschränken:
Zur Kasse

13 Ergebnisse.

Algorithms and VLSI Implementations of MIMO Detection

Halak, Basel / Bello, Ibrahim A.
Algorithms and VLSI Implementations of MIMO Detection
This book provides a detailed overview of detection algorithms for multiple-input multiple-output (MIMO) communications systems focusing on their hardware realisation. The book begins by analysing the maximum likelihood detector, which provides the optimal bit error rate performance in an uncoded communications system. However, the maximum likelihood detector experiences a high complexity that scales exponentially with the number of antennas, ...

CHF 109.00

Machine Learning for Embedded System Security

Halak, Basel
Machine Learning for Embedded System Security
This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusse...

CHF 123.00

Algorithms and VLSI Implementations of MIMO Detection

Halak, Basel / Bello, Ibrahim A.
Algorithms and VLSI Implementations of MIMO Detection
This book provides a detailed overview of detection algorithms for multiple-input multiple-output (MIMO) communications systems focusing on their hardware realisation. The book begins by analysing the maximum likelihood detector, which provides the optimal bit error rate performance in an uncoded communications system. However, the maximum likelihood detector experiences a high complexity that scales exponentially with the number of antennas, ...

CHF 109.00

Machine Learning for Embedded System Security

Halak, Basel
Machine Learning for Embedded System Security
This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusse...

CHF 123.00

Hardware Supply Chain Security

Halak, Basel
Hardware Supply Chain Security
This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it c...

CHF 109.00

Authentication of Embedded Devices

Halak, Basel
Authentication of Embedded Devices
This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focu...

CHF 83.00

Hardware Supply Chain Security

Halak, Basel
Hardware Supply Chain Security
This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it c...

CHF 146.00

Authentication of Embedded Devices

Halak, Basel
Authentication of Embedded Devices
This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focu...

CHF 115.00

Ageing of Integrated Circuits

Halak, Basel
Ageing of Integrated Circuits
This book provides comprehensive coverage of the latest research into integrated circuits' ageing, explaining the causes of this phenomenon, describing its effects on electronic systems, and providing mitigation techniques to build ageing-resilient circuits.

CHF 109.00

Ageing of Integrated Circuits

Halak, Basel
Ageing of Integrated Circuits
This book provides comprehensive coverage of the latest research into integrated circuits’ ageing, explaining the causes of this phenomenon, describing its effects on electronic systems, and providing mitigation techniques to build ageing-resilient circuits.  Describes in detail the physical mechanisms of CMOS ageing, Provides an in-depth discussion on the impact of ageing on the performance and reliability of integrated circuits, Presents st...

CHF 146.00

Physically Unclonable Functions

Halak, Basel
Physically Unclonable Functions
This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book:Provides readers with a comprehensive overview of security threats on embedded systems and existing countermeasures, Includes an intensive tutorial on how to design and evaluate physically unclonable functions, supported by circuit diagrams and exemplar hardware imple...

CHF 83.00

Physically Unclonable Functions

Halak, Basel
Physically Unclonable Functions
This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and existing countermeasures.This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approx...

CHF 110.00

VLSI Design of ECG Monitor from Concept to Silicon

Halak, Basel
VLSI Design of ECG Monitor from Concept to Silicon
ECG Monitor VLSI Design from Concept to Silicon" is an excellent reference for digital system design engineers. It provides a step by step guide to the design and test of a QRS detection algorithm, an essential part of electrocardiogram devices. The book contains detailed design examples of the system functional blocks which range from the architecture level design to the HDL description at the RTL level. It also outlines the power reduction t...

CHF 52.50