Security with Noisy Data

Available
0
StarStarStarStarStar
0Reviews
Unknown authorUnknown author

Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data.

It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable function...

Read more
E-book
pdf
Price
89.50 £

Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data.

It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable function...

Read more

Options

  • Formats: pdf
  • ISBN: 9781846289842
  • Publication Date: 24 Oct 2007
  • Publisher: Springer London
  • Product language: English
  • Drm Setting: DRM