Details

Using Imperfect Semiconductor Systems for Unique Identification


Using Imperfect Semiconductor Systems for Unique Identification


Springer Theses

von: Jonathan Roberts

96,29 €

Verlag: Springer
Format: PDF
Veröffentl.: 14.09.2017
ISBN/EAN: 9783319678917
Sprache: englisch

Dieses eBook enthält ein Wasserzeichen.

Beschreibungen

This thesis describes novel devices for the secure identification of objects or electronic systems. The identification relies on the the atomic-scale uniqueness of semiconductor devices by measuring a macroscopic quantum property of the system in question. Traditionally, objects and electronic systems have been securely identified by measuring specific characteristics: common examples include passwords, fingerprints used to identify a person or an electronic device, and holograms that can tag a given object to prove its authenticity. Unfortunately, modern technologies also make it possible to circumvent these everyday techniques.<p></p> Variations in quantum properties are amplified by the existence of atomic-scale imperfections. As such, these devices are the hardest possible systems to clone. They also use the least resources and provide robust security. Hence they have tremendous potential significance as a means of reliably telling the good guys from the bad.<p></p>
<p>An Introduction to Security Based on Physical Disorder.- An Introduction to Semiconductors and Quantum Confinement.- Sample Preparation and Experimental Techniques.- Unique Identification with Resonant Tunneling Diodes.- Langmuir-Blodgett Deposition of 2D Materials for Unique Identification.- Building Optoelectronic Heterostructures with the Langmuir-Blodgett Technique.- Conclusions and Future Work.</p>
This thesis describes novel devices for the secure identification of objects or electronic systems. The identification relies on the the atomic-scale uniqueness of semiconductor devices by measuring a macroscopic quantum property of the system in question. Traditionally, objects and electronic systems have been securely identified by measuring specific characteristics: common examples include passwords, fingerprints used to identify a person or an electronic device, and holograms that can tag a given object to prove its authenticity. Unfortunately, modern technologies also make it possible to circumvent these everyday techniques.<p></p>Variations in quantum properties are amplified by the existence of atomic-scale imperfections. As such, these devices are the hardest possible systems to clone. They also use the least resources and provide robust security. Hence they have tremendous potential significance as a means of reliably telling the good guys from the bad.<p></p>
Nominated as an outstanding PhD Thesis by the University of Lancaster Provides basis for potentially very significant advances in secure identification Gives accessible introductions both to the physics and the security aspects Breakthrough work that has been recognized by UK research council's ICT Pioneers Award
Nominated as an outstanding PhD Thesis by the University of Lancaster<div><br/></div><div>Provides basis for potentially very significant advances in secure identification<br/><div><br/></div><div>Gives accessible introductions both to the physics and the security aspects</div><div><br/></div><div>Breakthrough work that has been recognized by UK research council's ICT Pioneers Award</div><div><br/></div><div><br/></div><div><br/></div><div><br/></div><div><br/></div></div>

Diese Produkte könnten Sie auch interessieren:

Introduction to Focused Ion Beams
Introduction to Focused Ion Beams
von: Lucille A. Giannuzzi, Lucille A. North Carolina State University
PDF ebook
128,39 €
Advanced Magnetic Nanostructures
Advanced Magnetic Nanostructures
von: D.J. Sellmyer, Ralph Skomski
PDF ebook
149,79 €
High Thermal Conductivity Materials
High Thermal Conductivity Materials
von: Subhash L. Shinde, Jitendra Goela
PDF ebook
149,79 €