Coverart for item
The Resource Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting, edited by Pim Tuyls, Boris Skoric and Tom Kevenaar, (electronic book)

Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting, edited by Pim Tuyls, Boris Skoric and Tom Kevenaar, (electronic book)

Label
Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting
Title
Security with noisy data
Title remainder
on private biometrics, secure key storage and anti-counterfeiting
Statement of responsibility
edited by Pim Tuyls, Boris Skoric and Tom Kevenaar
Contributor
Subject
Language
eng
Summary
"Noisy data appears very naturally in applications where authentication is based on physical structures (e.g. physical unclonable functions) or physiological properties (e.g. biometrics). This book examines how the presence of noise has an impact on information security, and describes how it can be dealt with and even used to generate an advantage over traditional approaches. In addition, it provides a self-contained overview of the techniques and applications of security based on noisy data."--Jacket
Member of
Is part of
Cataloging source
GW5XE
Dewey number
005.82
Illustrations
illustrations
Index
index present
LC call number
  • QA76.9.A25
  • TK7867.5
LC item number
  • S43 2007eb
  • S355 2007eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1961-
http://library.link/vocab/relatedWorkOrContributorName
  • Tuyls, Pim
  • Škorić, Boris
  • Kevenaar, Thomas Andreas Maria
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Electronic noise
  • Computer Science
  • Algorithm Analysis and Problem Complexity
  • Data Encryption
  • Data Structures, Cryptology and Information Theory
Label
Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting, edited by Pim Tuyls, Boris Skoric and Tom Kevenaar, (electronic book)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Introduction / Tom Kevenaar, Boris S̆korić, Pim Tuyls -- Unbreakable keys from random noise / Ueli Maurer, Renato Renner, Stefan Wolf -- Fuzzy Commitment / Ari Juels -- A communication-theoretical view on secret extraction / Jean-Paul Linnartz, Boris S̆korić, Pim Tuyls -- Fuzzy extractors / Yevgeniy Dodis, Leonid Reyzin, Adam Smith -- Robust and reusable fuzzy extractors / Xavier Boyen -- Fuzzy identities and attribute-based encryption / Amit Sahai, Brent Waters -- Unconditionally secure multiparty computation from noisy resources / Stefan Wolf, Jürg Wullschleger -- Computationally secure authentication with noisy data / Berry Schoenmakers, Pim Tuyls -- Privacy enhancements for inexact biometric templates / Nalini Ratha [and others] -- Protestion of biometric information / Tom Kevenaar -- On the amount of entropy in PUFS / Boris S̆korić, Pim Tuyls -- Entrophy estimation for optical PUFs based on context-tree weighting methods / Tanya Ignatenko [and others] -- Controlled physical random functions / Blasie Geasend [and others] -- Experimental hardware for coating PUFs and optical PUFs / Boris S̆korić [and others] -- Secure key storage with PUFs / Pim Tuyls [and others] -- Anti-counterfeiting / Pim Tuyls [and others]
Control code
SPR209987148
Dimensions
unknown
Extent
1 online resource (xv, 339 pages)
Form of item
online
Isbn
9781846289835
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations
Specific material designation
remote
Label
Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting, edited by Pim Tuyls, Boris Skoric and Tom Kevenaar, (electronic book)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Introduction / Tom Kevenaar, Boris S̆korić, Pim Tuyls -- Unbreakable keys from random noise / Ueli Maurer, Renato Renner, Stefan Wolf -- Fuzzy Commitment / Ari Juels -- A communication-theoretical view on secret extraction / Jean-Paul Linnartz, Boris S̆korić, Pim Tuyls -- Fuzzy extractors / Yevgeniy Dodis, Leonid Reyzin, Adam Smith -- Robust and reusable fuzzy extractors / Xavier Boyen -- Fuzzy identities and attribute-based encryption / Amit Sahai, Brent Waters -- Unconditionally secure multiparty computation from noisy resources / Stefan Wolf, Jürg Wullschleger -- Computationally secure authentication with noisy data / Berry Schoenmakers, Pim Tuyls -- Privacy enhancements for inexact biometric templates / Nalini Ratha [and others] -- Protestion of biometric information / Tom Kevenaar -- On the amount of entropy in PUFS / Boris S̆korić, Pim Tuyls -- Entrophy estimation for optical PUFs based on context-tree weighting methods / Tanya Ignatenko [and others] -- Controlled physical random functions / Blasie Geasend [and others] -- Experimental hardware for coating PUFs and optical PUFs / Boris S̆korić [and others] -- Secure key storage with PUFs / Pim Tuyls [and others] -- Anti-counterfeiting / Pim Tuyls [and others]
Control code
SPR209987148
Dimensions
unknown
Extent
1 online resource (xv, 339 pages)
Form of item
online
Isbn
9781846289835
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations
Specific material designation
remote

Library Locations

Processing Feedback ...