"This is a fascinating text for those interested in, and prepared to explore, the latest developments in information security. It is a difficult read for the casual reader, but for the technically savvy security professional interested in the latest developments in biometrics, key security, and anti-counterfeiting, this book should be required reading."
Charles K. Davis, ACM Computing Reviews, February 2009)
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting.
"Sobre este título" puede pertenecer a otra edición de este libro.
Gastos de envío:
GRATIS
A Estados Unidos de America
Descripción Soft Cover. Condición: new. Nº de ref. del artículo: 9781849966931
Descripción Condición: New. Nº de ref. del artículo: ABLIING23Mar2912160255001
Descripción Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting. 356 pp. Englisch. Nº de ref. del artículo: 9781849966931
Descripción Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. A state-of-the-art survey into the theory and practice of new technologies in the field of security based on noisy dataProvides a comprehensive overview of the theory of extracting cryptographic keys from noisy dataDescribes applications in. Nº de ref. del artículo: 4288800
Descripción Taschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data.It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable functions are discussed extensively. Key new technologies discussed include: -Algorithms to derive secure keys form noisy data in particular from Physical Unclonable Functions and Biometrics, - also the theory which proves that those algorithms are secure is made accessible; Practical Implementations of the above mentioned algorithms; - Techniques that give insight in the security of those systems in practice; An overview and detailed description of new applications that become possible by using these new algorithms.This book can serve as a starting point for PhD students entering the field and will also benefit professionals. Nº de ref. del artículo: 9781849966931
Descripción Condición: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Nº de ref. del artículo: ria9781849966931_lsuk