Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting.
Or split into 4x interest-free payments of 25% on orders over R50
Learn more
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting.
Imprint | Springer |
Country of origin | United States |
Release date | August 2008 |
Availability | Supplier out of stock. If you add this item to your wish list we will let you know when it becomes available. |
First published | August 2008 |
Editors | Pim Tuyls, Boris ??Koric, Tom Kevenaar |
Dimensions | 156 x 234 x 19mm (L x W x T) |
Format | Paperback - Trade |
Pages | 356 |
ISBN-13 | 978-1-84800-669-0 |
Barcode | 9781848006690 |
Categories | |
LSN | 1-84800-669-1 |