by PimTuyls (Editor), Boriskoric (Editor), TomKevenaar (Editor)
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting.
Format: Hardcover
Pages: 344
Publisher: Springer
Published: 15 Oct 2007
ISBN 10: 1846289831
ISBN 13: 9781846289835