Tuyls / Skoric / Škoric | Security with Noisy Data | Buch | 978-1-84628-983-5 | sack.de

Buch, Englisch, 340 Seiten, Format (B × H): 164 mm x 242 mm, Gewicht: 1490 g

Tuyls / Skoric / Škoric

Security with Noisy Data

On Private Biometrics, Secure Key Storage and Anti-Counterfeiting
Revised Auflage
ISBN: 978-1-84628-983-5
Verlag: Springer

On Private Biometrics, Secure Key Storage and Anti-Counterfeiting

Buch, Englisch, 340 Seiten, Format (B × H): 164 mm x 242 mm, Gewicht: 1490 g

ISBN: 978-1-84628-983-5
Verlag: Springer


Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data.

It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable functions are discussed extensively. Key new technologies discussed include: -Algorithms to derive secure keys form noisy data in particular from Physical Unclonable Functions and Biometrics, - also the theory which proves that those algorithms are secure is made accessible; Practical Implementations of the above mentioned algorithms; - Techniques that give insight in the security of those systems in practice; An overview and detailed description of new applications that become possible by using these new algorithms.

This book can serve as a starting point for PhD students entering the field and will also benefit professionals.

Tuyls / Skoric / Škoric Security with Noisy Data jetzt bestellen!

Zielgruppe


Professional/practitioner

Weitere Infos & Material


Theory of Security with Noisy Data.- Unbreakable Keys from Random Noise.- Fuzzy Commitment.- A Communication-Theoretical View on Secret Extraction.- Fuzzy Extractors.- Robust and Reusable Fuzzy Extractors.- Fuzzy Identities and Attribute-Based Encryption.- Unconditionally Secure Multiparty Computation from Noisy Resources.- Computationally Secure Authentication with Noisy Data.- Applications of Security with Noisy Data.- Privacy Enhancements for Inexact Biometric Templates.- Protection of Biometric Information.- On the Amount of Entropy in PUFs.- Entropy Estimation for Optical PUFs Based on Context-Tree Weighting Methods.- Controlled Physical Random Functions.- Experimental Hardware for Coating PUFs and Optical PUFs.- Secure Key Storage with PUFs.- Anti-Counterfeiting.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.