<p><em><strong>Nanoelectronic Devices for Hardware and Software Security</strong></em> has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security. It also covers the future research direction
Nanoelectronic Devices for Hardware and Software Security
โ Scribed by Balwinder Raj; Arun Kumar Singh
- Publisher
- CRC Press
- Year
- 2021
- Tongue
- English
- Leaves
- 353
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Nanoelectronic Devices for Hardware and Software Security
has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security. It also covers the future research directions in this domain. In this evolving era, nanotechnology is converting semiconductor devices dimensions from micron technology to nanotechnology. Nanoelectronics would be the key enabler for innovation in nanoscale devices, circuits, and systems.
The motive for this research book is to provide relevant theoretical frameworks that include device physics, modeling, circuit design, and the latest developments in experimental fabrication in the field of nanotechnology for hardware/software security. There are numerous challenges in the development of models for nanoscale devices (e.g., FinFET, gate-all-around devices, TFET, etc.), short channel effects, fringing effects, high leakage current, and power dissipation, among others. This book will help to identify areas where there are challenges and apply nanodevice and circuit techniques to address hardware/software security issues.
โฆ Table of Contents
Cover
Half Title
Series Page
Title Page
Copyright Page
Contents
Editors
Contributors
1 Emerging Nanoelectronic Devices
2 A Novel Vertical Tunnel FET and Its Application in Mixed Mode
3 Vertical T-Shaped Heterojunction Tunnel Field-Effect Transistor for Low Power Security Systems
4 Silicene and Germanene Nanoribbons for Interconnect Applications
5 Memristors and Their Applications
6 Memristor: A Novel Device for Better Hardware/Software Security
7 A State-of-the-Art Study on Physical Unclonable Functions for Hardware Intrinsic Security
8 Review of the Medical Internet of Things-Based RFID Security Protocols
9 SOA-MZI-Based Nanoscale Optical Communication with various Modulation Formats
10 Effect of Dielectric Material on Electrical Parameters Present near Source Region in Hetero Gate Dielectric TFET
11 Quantum-Dot Cellular Automata-Based Encoder Circuit Using Layered Universal Gates
12 Investigation of Nano-Structured Honeycomb Patch Antenna with Photonic Crystal Substrate
13 Silicon Micromachining for Submillimeter: Wave and THz-Technology
14 Photodetectors for Security Application
15 Nano-Rectifier: A Review, Current Status, and Future Scope
16 Graphene SymFET and SiNW FET for IP Piracy Prevention Security Systems
Index
๐ SIMILAR VOLUMES
Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In this book the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication system
Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In this book the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication system
Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In this book the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication system
Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In this book the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication system
Designed for the beginner yet useful for the expert, COMPUTER NETWORKING FROM LANS TO WANS: HARDWARE, SOFTWARE, AND SECURITY provides comprehensive coverage of all aspects of networking. This book contains 24 chapters illustrating network hardware and software, network operating systems, multimedia