Security with Noisy Data
On Private Biometrics, Secure Key Storage and Anti-Counterfeiting
(Sprache: Englisch)
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview...
Jetzt vorbestellen
versandkostenfrei
Buch (Gebunden)
Fr. 118.00
inkl. MwSt.
- Kreditkarte, Paypal, Rechnungskauf
- 30 Tage Widerrufsrecht
Produktdetails
Produktinformationen zu „Security with Noisy Data “
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting.
Klappentext zu „Security with Noisy Data “
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data.It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable functions are discussed extensively. Key new technologies discussed include: -Algorithms to derive secure keys form noisy data in particular from Physical Unclonable Functions and Biometrics, - also the theory which proves that those algorithms are secure is made accessible; Practical Implementations of the above mentioned algorithms; - Techniques that give insight in the security of those systems in practice; An overview and detailed description of new applications that become possible by using these new algorithms.
This book can serve as a starting point for PhD students entering the field and will also benefit professionals.
Inhaltsverzeichnis zu „Security with Noisy Data “
Theory of Security with Noisy Data.- Unbreakable Keys from Random Noise.- Fuzzy Commitment.- A Communication-Theoretical View on Secret Extraction.- Fuzzy Extractors.- Robust and Reusable Fuzzy Extractors.- Fuzzy Identities and Attribute-Based Encryption.- Unconditionally Secure Multiparty Computation from Noisy Resources.- Computationally Secure Authentication with Noisy Data.- Applications of Security with Noisy Data.- Privacy Enhancements for Inexact Biometric Templates.- Protection of Biometric Information.- On the Amount of Entropy in PUFs.- Entropy Estimation for Optical PUFs Based on Context-Tree Weighting Methods.- Controlled Physical Random Functions.- Experimental Hardware for Coating PUFs and Optical PUFs.- Secure Key Storage with PUFs.- Anti-Counterfeiting.
Bibliographische Angaben
- 2007, XVI, 340 Seiten, Masse: 15,6 x 23,4 cm, Gebunden, Englisch
- Herausgegeben: Pim Tuyls, Boris Skoric, Tom Kevenaar
- Verlag: Springer, Berlin
- ISBN-10: 1846289831
- ISBN-13: 9781846289835
Sprache:
Englisch
Rezension zu „Security with Noisy Data “
"This is a fascinating text for those interested in, and prepared to explore, the latest developments in information security. It is a difficult read for the casual reader, but for the technically savvy security professional interested in the latest developments in biometrics, key security, and anti-counterfeiting, this book should be required reading."Charles K. Davis, ACM Computing Reviews, February 2009)
Pressezitat
"This is a fascinating text for those interested in, and prepared to explore, the latest developments in information security. It is a difficult read for the casual reader, but for the technically savvy security professional interested in the latest developments in biometrics, key security, and anti-counterfeiting, this book should be required reading."Charles K. Davis, ACM Computing Reviews, February 2009)
Kommentar zu "Security with Noisy Data"
0 Gebrauchte Artikel zu „Security with Noisy Data“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Security with Noisy Data".
Kommentar verfassen