找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security with Noisy Data; On Private Biometric Pim Tuyls,Boris Skoric,Tom Kevenaar Book 2007 Springer-Verlag London 2007 Anti-counterfeitin

[复制链接]
查看: 27161|回复: 58
发表于 2025-3-21 19:29:18 | 显示全部楼层 |阅读模式
书目名称Security with Noisy Data
副标题On Private Biometric
编辑Pim Tuyls,Boris Skoric,Tom Kevenaar
视频video
概述A state-of-the-art survey into the theory and practice of new technologies in the field of security based on noisy data.Provides a comprehensive overview of the theory of extracting cryptographic keys
图书封面Titlebook: Security with Noisy Data; On Private Biometric Pim Tuyls,Boris Skoric,Tom Kevenaar Book 2007 Springer-Verlag London 2007 Anti-counterfeitin
描述.Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data...It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable functions are discussed extensively. Key new technologies discussed include: -Algorithms to derive secure keys form noisy data in particular from Physical Unclonable Functions and Biometrics, - also the theory which proves that those algorithms are secure is made accessible; Practical Implementations of the above mentioned algorithms; - Techniques that give insight in the security of those systems in practice; An overview and detailed description of new applications that become possible by using these new algorithms...This book can serve as a starting point for PhD students entering the field and will also benefit professionals..
出版日期Book 2007
关键词Anti-counterfeiting; Entropy estimation; Fuzzy ID-based encryption; Fuzzy commitment; Fuzzy extractor; In
版次1
doihttps://doi.org/10.1007/978-1-84628-984-2
isbn_softcover978-1-84996-693-1
isbn_ebook978-1-84628-984-2
copyrightSpringer-Verlag London 2007
The information of publication is updating

书目名称Security with Noisy Data影响因子(影响力)




书目名称Security with Noisy Data影响因子(影响力)学科排名




书目名称Security with Noisy Data网络公开度




书目名称Security with Noisy Data网络公开度学科排名




书目名称Security with Noisy Data被引频次




书目名称Security with Noisy Data被引频次学科排名




书目名称Security with Noisy Data年度引用




书目名称Security with Noisy Data年度引用学科排名




书目名称Security with Noisy Data读者反馈




书目名称Security with Noisy Data读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-22 00:16:56 | 显示全部楼层
发表于 2025-3-22 01:31:05 | 显示全部楼层
发表于 2025-3-22 08:11:36 | 显示全部楼层
发表于 2025-3-22 10:23:25 | 显示全部楼层
发表于 2025-3-22 14:38:20 | 显示全部楼层
发表于 2025-3-22 20:48:35 | 显示全部楼层
发表于 2025-3-22 23:00:14 | 显示全部楼层
Robust and Reusable Fuzzy Extractorsptographic secrets. The appeal of biometric data as cryptographic secrets stems from their high apparent entropy, their availability to their owner, and their relative immunity to loss. In particular, they constitute a very effective basis for user authentication, especially when combined with compl
发表于 2025-3-23 01:30:07 | 显示全部楼层
Fuzzy Identities and Attribute-Based Encryption set of descriptive attributes. A fuzzy IBE scheme allows for a private key for an identity,ω., to decrypt a ciphertext encrypted with an identity, .ω´, if and only if the identities .ω and .ω´are close to each other as measured by the "set overlap" distance metric. A fuzzy IBE scheme can be applied
发表于 2025-3-23 07:51:46 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-18 12:43
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表