Skip to main content
Book cover

Security with Noisy Data

On Private Biometrics, Secure Key Storage and Anti-Counterfeiting

  • Book
  • © 2007

Overview

  • A state-of-the-art survey into the theory and practice of new technologies in the field of security based on noisy data
  • Provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data
  • Describes applications in the field of biometrics, secure key storage, and anti-counterfeiting

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (17 chapters)

  1. Theory of Security with Noisy Data

  2. Applications of Security with Noisy Data

Keywords

About this book

Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data.

It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable functions are discussed extensively. Key new technologies discussed include: -Algorithms to derive secure keys form noisy data in particular from Physical Unclonable Functions and Biometrics, - also the theory which proves that those algorithms are secure is made accessible; Practical Implementations of the above mentioned algorithms; - Techniques that give insight in the security of those systems in practice; An overview and detailed description of new applications that become possible by using these new algorithms.

This book can serve as a starting point for PhD students entering the field and will also benefit professionals.

Reviews

"This is a fascinating text for those interested in, and prepared to explore, the latest developments in information security. It is a difficult read for the casual reader, but for the technically savvy security professional interested in the latest developments in biometrics, key security, and anti-counterfeiting, this book should be required reading."
Charles K. Davis, ACM Computing Reviews, February 2009)

Editors and Affiliations

  • Philips Research, Netherlands

    Pim Tuyls, Boris Skoric, Tom Kevenaar

Bibliographic Information

  • Book Title: Security with Noisy Data

  • Book Subtitle: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting

  • Editors: Pim Tuyls, Boris Skoric, Tom Kevenaar

  • DOI: https://doi.org/10.1007/978-1-84628-984-2

  • Publisher: Springer London

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag London 2007

  • Hardcover ISBN: 978-1-84628-983-5Published: 15 October 2007

  • Softcover ISBN: 978-1-84996-693-1Published: 13 October 2010

  • eBook ISBN: 978-1-84628-984-2Published: 24 October 2007

  • Edition Number: 1

  • Number of Pages: XVI, 340

  • Topics: Cryptology, Biometrics, Data Structures and Information Theory, Algorithm Analysis and Problem Complexity

Publish with us