Noisy data appear very naturally in applications where the
authentication is based on physical identifiers. This book provides
a self-contained overview of the techniques and applications of
security based on noisy data. It provides a comprehensive overview
of the theory of extracting cryptographic keys from noisy data, and
describes applications in the field of biometrics, secure key
storage, and anti-counterfeiting.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!