|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Pim Tuyls , Boris Škoric , Tom KevenaarPublisher: Springer London Ltd Imprint: Springer London Ltd Edition: Softcover reprint of hardcover 1st ed. 2007 Dimensions: Width: 15.50cm , Height: 1.80cm , Length: 23.50cm Weight: 0.545kg ISBN: 9781849966931ISBN 10: 1849966931 Pages: 340 Publication Date: 13 October 2010 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsTheory of Security with Noisy Data.- Unbreakable Keys from Random Noise.- Fuzzy Commitment.- A Communication-Theoretical View on Secret Extraction.- Fuzzy Extractors.- Robust and Reusable Fuzzy Extractors.- Fuzzy Identities and Attribute-Based Encryption.- Unconditionally Secure Multiparty Computation from Noisy Resources.- Computationally Secure Authentication with Noisy Data.- Applications of Security with Noisy Data.- Privacy Enhancements for Inexact Biometric Templates.- Protection of Biometric Information.- On the Amount of Entropy in PUFs.- Entropy Estimation for Optical PUFs Based on Context-Tree Weighting Methods.- Controlled Physical Random Functions.- Experimental Hardware for Coating PUFs and Optical PUFs.- Secure Key Storage with PUFs.- Anti-Counterfeiting.ReviewsThis is a fascinating text for those interested in, and prepared to explore, the latest developments in information security. It is a difficult read for the casual reader, but for the technically savvy security professional interested in the latest developments in biometrics, key security, and anti-counterfeiting, this book should be required reading. Charles K. Davis, ACM Computing Reviews, February 2009) This is a fascinating text for those interested in, and prepared to explore, the latest developments in information security. It is a difficult read for the casual reader, but for the technically savvy security professional interested in the latest developments in biometrics, key security, and anti-counterfeiting, this book should be required reading. Charles K. Davis, ACM Computing Reviews, February 2009) This is a fascinating text for those interested in, and prepared to explore, the latest developments in information security. It is a difficult read for the casual reader, but for the technically savvy security professional interested in the latest developments in biometrics, key security, and anti-counterfeiting, this book should be required reading. Charles K. Davis, ACM Computing Reviews, February 2009) ""This is a fascinating text for those interested in, and prepared to explore, the latest developments in information security. It is a difficult read for the casual reader, but for the technically savvy security professional interested in the latest developments in biometrics, key security, and anti-counterfeiting, this book should be required reading."" Charles K. Davis, ACM Computing Reviews, February 2009) Author InformationTab Content 6Author Website:Countries AvailableAll regions |