Overview
- A state-of-the-art survey into the theory and practice of new technologies in the field of security based on noisy data
- Provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data
- Describes applications in the field of biometrics, secure key storage, and anti-counterfeiting
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (17 chapters)
-
Theory of Security with Noisy Data
-
Applications of Security with Noisy Data
Keywords
About this book
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data.
It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable functions are discussed extensively. Key new technologies discussed include: -Algorithms to derive secure keys form noisy data in particular from Physical Unclonable Functions and Biometrics, - also the theory which proves that those algorithms are secure is made accessible; Practical Implementations of the above mentioned algorithms; - Techniques that give insight in the security of those systems in practice; An overview and detailed description of new applications that become possible by using these new algorithms.
This book can serve as a starting point for PhD students entering the field and will also benefit professionals.
Reviews
"This is a fascinating text for those interested in, and prepared to explore, the latest developments in information security. It is a difficult read for the casual reader, but for the technically savvy security professional interested in the latest developments in biometrics, key security, and anti-counterfeiting, this book should be required reading."
Charles K. Davis, ACM Computing Reviews, February 2009)
Editors and Affiliations
Bibliographic Information
Book Title: Security with Noisy Data
Book Subtitle: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting
Editors: Pim Tuyls, Boris Skoric, Tom Kevenaar
DOI: https://doi.org/10.1007/978-1-84628-984-2
Publisher: Springer London
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag London 2007
Hardcover ISBN: 978-1-84628-983-5Published: 15 October 2007
Softcover ISBN: 978-1-84996-693-1Published: 13 October 2010
eBook ISBN: 978-1-84628-984-2Published: 24 October 2007
Edition Number: 1
Number of Pages: XVI, 340
Topics: Cryptology, Biometrics, Data Structures and Information Theory, Algorithm Analysis and Problem Complexity