Security with Noisy Data

Security with Noisy Data

4.11 - 1251 ratings - Source

Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting.The string w is then used to derive a secret key R (e.g., used to encrypt the local hard drive). ... and the recovery algorithm Rep may receive an input IƒP = P. Such situations call, essentially, for authentication based on noisy secrets W a‰ˆ W. The anbsp;...

Title:Security with Noisy Data
Author:Pim Tuyls, Boris Škoric, Tom Kevenaar
Publisher:Springer Science & Business Media - 2007-10-24


You Must CONTINUE and create a free account to access unlimited downloads & streaming