Books on the topic 'Hardware Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Hardware Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3.
Full textTehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. Hardware Security Primitives. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-19185-5.
Full textSadeghi, Ahmad-Reza, and David Naccache, eds. Towards Hardware-Intrinsic Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14452-3.
Full textSklavos, Nicolas, Ricardo Chaves, Giorgio Di Natale, and Francesco Regazzoni, eds. Hardware Security and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44318-8.
Full textHalak, Basel, ed. Hardware Supply Chain Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62707-2.
Full textFarahmandi, Farimah, M. Sazadur Rahman, Sree Ranjani Rajendran, and Mark Tehranipoor. CAD for Hardware Security. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26896-0.
Full textTehranipoor, Mark, ed. Emerging Topics in Hardware Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64448-2.
Full textKatkoori, Srinivas, and Sheikh Ariful Islam, eds. Behavioral Synthesis for Hardware Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-78841-4.
Full textMishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor, eds. Hardware IP Security and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49025-0.
Full textTehranipoor, Mark, N. Nalla Anandakumar, and Farimah Farahmandi. Hardware Security Training, Hands-on! Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-31034-8.
Full textMishra, Ashutosh, Mrinal Goswami, Manoj Kumar, and Navin Singh Rajput, eds. Hardware Security: Challenges and Solutions. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-81213-2.
Full textKelly, Wayne. Security hardware and security system planning for museums. Canadian Conservation Institute, 1998.
Find full textKelly, Wayne. Security hardware and security system planning for museums. Canadian Conservation Institute, 1998.
Find full textRangarajan, Nikhil, Satwik Patnaik, Johann Knechtel, Shaloo Rakheja, and Ozgur Sinanoglu. The Next Era in Hardware Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-85792-9.
Full textTehranipoor, Mohammad, and Cliff Wang, eds. Introduction to Hardware Security and Trust. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4419-8080-9.
Full textCliff, Wang, and SpringerLink (Online service), eds. Introduction to Hardware Security and Trust. Springer Science+Business Media, LLC, 2012.
Find full textTang, Beng Chiew. Security Engineering of Hardware-Software Interfaces. [publisher not identified], 2018.
Find full textRaj, Balwinder, and Arun Kumar Singh. Nanoelectronic Devices for Hardware and Software Security. CRC Press, 2021. http://dx.doi.org/10.1201/9781003126645.
Full textKhalil, Kasem, Haytham Idriss, Tarek Idriss, and Magdy Bayoumi. Lightweight Hardware Security and Physically Unclonable Functions. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-76328-1.
Full textSantikellur, Pranesh, and Rajat Subhra Chakraborty. Deep Learning for Computational Problems in Hardware Security. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-4017-0.
Full textPATRANABIS, SIKHAR, and Debdeep Mukhopadhyay, eds. Fault Tolerant Architectures for Cryptography and Hardware Security. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-1387-4.
Full textLast, R. W. PC security: Aprofessional guide to hardware and data protection. Sigma, 1990.
Find full textVemuri, Ranga, and Suyuan Chen. Split Manufacturing of Integrated Circuits for Hardware Security and Trust. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73445-9.
Full textL, Antonakos James, ed. Computer networking from LANs to WANs: Hardware, software and security. Course Technology, Cengage Learning, 2010.
Find full textSakiyama, Kazuo. Security of block ciphers: From algorithm design to hardware implementation. John Wiley & Sons Inc., 2015.
Find full textGuha, Krishnendu, Sangeet Saha, and Amlan Chakrabarti. Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79701-0.
Full textMukhopadhyay, Debdeep, and Rajat Subhra Chakraborty. Hardware Security. Chapman and Hall/CRC, 2014. http://dx.doi.org/10.1201/b17555.
Full textPundir, Nitin, Nidish Vashishta, Mark Tehranipoor, and Farimah Farahmandi. Hardware Security Primitives. Springer International Publishing AG, 2022.
Find full textVashistha, Nidish. Hardware Security Primitives. Springer International Publishing AG, 2023.
Find full textBlokdyk, Gerardus. Hardware security module: Core. Createspace Independent Publishing Platform, 2017.
Find full textRahman, M. Sazadur. CAD for Hardware Security. Springer International Publishing AG, 2024.
Find full textRahman, M. Sazadur. CAD for Hardware Security. Springer International Publishing AG, 2023.
Find full textThe Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks. No Starch Press, 2021.
Find full textMishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor. Hardware IP Security and Trust. Springer, 2018.
Find full textTehranipoor, Mark. Emerging Topics in Hardware Security. Springer International Publishing AG, 2022.
Find full textMishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor. Hardware IP Security and Trust. Springer, 2017.
Find full textMishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor. Hardware IP Security and Trust. Springer, 2017.
Find full textKatkoori, Srinivas, and Sheikh Ariful Islam. Behavioral Synthesis for Hardware Security. Springer International Publishing AG, 2021.
Find full text(Editor), Nadia Nedjah, Luiza De Macedo Mourelle (Editor), and Luiza De Macedo Mourelle (Editor), eds. Embedded Cryptographic Hardware: Design & Security. Nova Science Publishers, 2006.
Find full textAnandakumar, N. Nalla. Hardware Security Training, Hands-On! Springer International Publishing AG, 2023.
Find full textBehavioral Synthesis for Hardware Security. Springer International Publishing AG, 2023.
Find full textBhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection through Obfuscation. Springer, 2018.
Find full textBhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection through Obfuscation. Springer, 2017.
Find full textBhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection Through Obfuscation. Springer, 2017.
Find full textChakraborty, Rajat Subhra, and Debdeep Mukhopadhyay. Hardware Security: Design, Threats, and Safeguards. Taylor & Francis Group, 2014.
Find full textGunn, Lachlan J., Jan-Erik Ekberg, Hans Liljestrand, Vijayanand Nayani, and N. Asokan. Hardware Platform Security for Mobile Devices. Now Publishers, 2022.
Find full text