It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable functions are discussed extensively. Key new technologies discussed include: -Algorithms to derive secure keys form noisy data in particular from Physical Unclonable Functions and Biometrics, - also the theory which proves that those algorithms are secure is made accessible; Practical Implementations of the above mentioned algorithms; - Techniques that give insight in the security of those systems in practice; An overview and detailed description of new applications that become possible by using these new algorithms.
This book can serve as a starting point for PhD students entering the field and will also benefit professionals.
It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable functions are discussed extensively. Key new technologies discussed include: -Algorithms to derive secure keys form noisy data in particular from Physical Unclonable Functions and Biometrics, - also the theory which proves that those algorithms are secure is made accessible; Practical Implementations of the above mentioned algorithms; - Techniques that give insight in the security of those systems in practice; An overview and detailed description of new applications that become possible by using these new algorithms.
This book can serve as a starting point for PhD students entering the field and will also benefit professionals.

Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting
340
Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting
340Hardcover(2007)
Product Details
ISBN-13: | 9781846289835 |
---|---|
Publisher: | Springer London |
Publication date: | 10/15/2007 |
Edition description: | 2007 |
Pages: | 340 |
Product dimensions: | 6.10(w) x 9.25(h) x 0.03(d) |