Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting.
Or split into 4x interest-free payments of 25% on orders over R50
Learn more
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting.
Imprint | Springer London |
Country of origin | United Kingdom |
Release date | October 2010 |
Availability | Expected to ship within 10 - 15 working days |
First published | 2007 |
Editors | Pim Tuyls, Boris Skoric, Tom Kevenaar |
Dimensions | 235 x 155 x 18mm (L x W x T) |
Format | Paperback |
Pages | 340 |
Edition | Softcover reprint of hardcover 1st ed. 2007 |
ISBN-13 | 978-1-84996-693-1 |
Barcode | 9781849966931 |
Categories | |
LSN | 1-84996-693-1 |