To see the other types of publications on this topic, follow the link: Hardware Security.

Books on the topic 'Hardware Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Hardware Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. Hardware Security Primitives. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-19185-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sadeghi, Ahmad-Reza, and David Naccache, eds. Towards Hardware-Intrinsic Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14452-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sklavos, Nicolas, Ricardo Chaves, Giorgio Di Natale, and Francesco Regazzoni, eds. Hardware Security and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44318-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Halak, Basel, ed. Hardware Supply Chain Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62707-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Farahmandi, Farimah, M. Sazadur Rahman, Sree Ranjani Rajendran, and Mark Tehranipoor. CAD for Hardware Security. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26896-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tehranipoor, Mark, ed. Emerging Topics in Hardware Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64448-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Katkoori, Srinivas, and Sheikh Ariful Islam, eds. Behavioral Synthesis for Hardware Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-78841-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor, eds. Hardware IP Security and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49025-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tehranipoor, Mark, N. Nalla Anandakumar, and Farimah Farahmandi. Hardware Security Training, Hands-on! Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-31034-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Mishra, Ashutosh, Mrinal Goswami, Manoj Kumar, and Navin Singh Rajput, eds. Hardware Security: Challenges and Solutions. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-81213-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kelly, Wayne. Security hardware and security system planning for museums. Canadian Conservation Institute, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Kelly, Wayne. Security hardware and security system planning for museums. Canadian Conservation Institute, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Rangarajan, Nikhil, Satwik Patnaik, Johann Knechtel, Shaloo Rakheja, and Ozgur Sinanoglu. The Next Era in Hardware Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-85792-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Tehranipoor, Mohammad, and Cliff Wang, eds. Introduction to Hardware Security and Trust. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4419-8080-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Cliff, Wang, and SpringerLink (Online service), eds. Introduction to Hardware Security and Trust. Springer Science+Business Media, LLC, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Tang, Beng Chiew. Security Engineering of Hardware-Software Interfaces. [publisher not identified], 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Raj, Balwinder, and Arun Kumar Singh. Nanoelectronic Devices for Hardware and Software Security. CRC Press, 2021. http://dx.doi.org/10.1201/9781003126645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Khalil, Kasem, Haytham Idriss, Tarek Idriss, and Magdy Bayoumi. Lightweight Hardware Security and Physically Unclonable Functions. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-76328-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Santikellur, Pranesh, and Rajat Subhra Chakraborty. Deep Learning for Computational Problems in Hardware Security. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-4017-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

PATRANABIS, SIKHAR, and Debdeep Mukhopadhyay, eds. Fault Tolerant Architectures for Cryptography and Hardware Security. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-1387-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Last, R. W. PC security: Aprofessional guide to hardware and data protection. Sigma, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Vemuri, Ranga, and Suyuan Chen. Split Manufacturing of Integrated Circuits for Hardware Security and Trust. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73445-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

L, Antonakos James, ed. Computer networking from LANs to WANs: Hardware, software and security. Course Technology, Cengage Learning, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Sakiyama, Kazuo. Security of block ciphers: From algorithm design to hardware implementation. John Wiley & Sons Inc., 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Guha, Krishnendu, Sangeet Saha, and Amlan Chakrabarti. Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79701-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Hardware Security. Elsevier, 2019. http://dx.doi.org/10.1016/c2016-0-03251-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Mukhopadhyay, Debdeep, and Rajat Subhra Chakraborty. Hardware Security. Chapman and Hall/CRC, 2014. http://dx.doi.org/10.1201/b17555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Hardware Security. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Pundir, Nitin, Nidish Vashishta, Mark Tehranipoor, and Farimah Farahmandi. Hardware Security Primitives. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Vashistha, Nidish. Hardware Security Primitives. Springer International Publishing AG, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Blokdyk, Gerardus. Hardware security module: Core. Createspace Independent Publishing Platform, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Rahman, M. Sazadur. CAD for Hardware Security. Springer International Publishing AG, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Rahman, M. Sazadur. CAD for Hardware Security. Springer International Publishing AG, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks. No Starch Press, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Mishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor. Hardware IP Security and Trust. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Wiley. AWBC Hardware Networking and Security. Hungry Minds Inc,U.S., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Emerging Topics in Hardware Security. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Tehranipoor, Mark. Emerging Topics in Hardware Security. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Mishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor. Hardware IP Security and Trust. Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Mishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor. Hardware IP Security and Trust. Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Katkoori, Srinivas, and Sheikh Ariful Islam. Behavioral Synthesis for Hardware Security. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

(Editor), Nadia Nedjah, Luiza De Macedo Mourelle (Editor), and Luiza De Macedo Mourelle (Editor), eds. Embedded Cryptographic Hardware: Design & Security. Nova Science Publishers, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Anandakumar, N. Nalla. Hardware Security Training, Hands-On! Springer International Publishing AG, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Behavioral Synthesis for Hardware Security. Springer International Publishing AG, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Bhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection through Obfuscation. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Bhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection through Obfuscation. Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Bhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection Through Obfuscation. Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Chakraborty, Rajat Subhra, and Debdeep Mukhopadhyay. Hardware Security: Design, Threats, and Safeguards. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Gunn, Lachlan J., Jan-Erik Ekberg, Hans Liljestrand, Vijayanand Nayani, and N. Asokan. Hardware Platform Security for Mobile Devices. Now Publishers, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!