Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data.

It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable functions are discussed extensively. Key new technologies discussed include: -Algorithms to derive secure keys form noisy data in particular from Physical Unclonable Functions and Biometrics, - also the theory which proves that those algorithms are secure is made accessible; Practical Implementations of the above mentioned algorithms; - Techniques that give insight in the security of those systems in practice; An overview and detailed description of new applications that become possible by using these new algorithms.

This book can serve as a starting point for PhD students entering the field and will also benefit professionals.

1101512341
Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data.

It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable functions are discussed extensively. Key new technologies discussed include: -Algorithms to derive secure keys form noisy data in particular from Physical Unclonable Functions and Biometrics, - also the theory which proves that those algorithms are secure is made accessible; Practical Implementations of the above mentioned algorithms; - Techniques that give insight in the security of those systems in practice; An overview and detailed description of new applications that become possible by using these new algorithms.

This book can serve as a starting point for PhD students entering the field and will also benefit professionals.

109.99 In Stock
Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting

Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting

Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting

Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting

Hardcover(2007)

$109.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data.

It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable functions are discussed extensively. Key new technologies discussed include: -Algorithms to derive secure keys form noisy data in particular from Physical Unclonable Functions and Biometrics, - also the theory which proves that those algorithms are secure is made accessible; Practical Implementations of the above mentioned algorithms; - Techniques that give insight in the security of those systems in practice; An overview and detailed description of new applications that become possible by using these new algorithms.

This book can serve as a starting point for PhD students entering the field and will also benefit professionals.


Product Details

ISBN-13: 9781846289835
Publisher: Springer London
Publication date: 10/15/2007
Edition description: 2007
Pages: 340
Product dimensions: 6.10(w) x 9.25(h) x 0.03(d)

Table of Contents

Theory of Security with Noisy Data.- Unbreakable Keys from Random Noise.- Fuzzy Commitment.- A Communication-Theoretical View on Secret Extraction.- Fuzzy Extractors.- Robust and Reusable Fuzzy Extractors.- Fuzzy Identities and Attribute-Based Encryption.- Unconditionally Secure Multiparty Computation from Noisy Resources.- Computationally Secure Authentication with Noisy Data.- Applications of Security with Noisy Data.- Privacy Enhancements for Inexact Biometric Templates.- Protection of Biometric Information.- On the Amount of Entropy in PUFs.- Entropy Estimation for Optical PUFs Based on Context-Tree Weighting Methods.- Controlled Physical Random Functions.- Experimental Hardware for Coating PUFs and Optical PUFs.- Secure Key Storage with PUFs.- Anti-Counterfeiting.
From the B&N Reads Blog

Customer Reviews