书目名称 | Security with Noisy Data |
副标题 | On Private Biometric |
编辑 | Pim Tuyls,Boris Skoric,Tom Kevenaar |
视频video | http://file.papertrans.cn/864/863621/863621.mp4 |
概述 | A state-of-the-art survey into the theory and practice of new technologies in the field of security based on noisy data.Provides a comprehensive overview of the theory of extracting cryptographic keys |
图书封面 |  |
描述 | .Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data...It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable functions are discussed extensively. Key new technologies discussed include: -Algorithms to derive secure keys form noisy data in particular from Physical Unclonable Functions and Biometrics, - also the theory which proves that those algorithms are secure is made accessible; Practical Implementations of the above mentioned algorithms; - Techniques that give insight in the security of those systems in practice; An overview and detailed description of new applications that become possible by using these new algorithms...This book can serve as a starting point for PhD students entering the field and will also benefit professionals.. |
出版日期 | Book 2007 |
关键词 | Anti-counterfeiting; Entropy estimation; Fuzzy ID-based encryption; Fuzzy commitment; Fuzzy extractor; In |
版次 | 1 |
doi | https://doi.org/10.1007/978-1-84628-984-2 |
isbn_softcover | 978-1-84996-693-1 |
isbn_ebook | 978-1-84628-984-2 |
copyright | Springer-Verlag London 2007 |