Kevenaar, Tom
Security with Noisy Data
Part I. Theory of Security with Noisy Data
1. Introduction
Pim Tuyls, Boris Skoric, Tom Kevenaar
2. Unbreakable Keys from Random Noise
Ueli Maurer, Renato Renner, Stefan Wolf
3. Fuzzy Commitment
Ari Juels
4. A Communication-Theoretical View on Secret Extraction
Jean-Paul Linnartz, Pim Tuyls, Boris Skoric
5. Fuzzy Extractors
Yevgeniy Dodis, Leonid Reyzin, Adam Smith
6. Robust and Reusable Fuzzy Extractors
Xavier Boyen
7. Fuzzy Identities and Attribute-Based Encryption
Amit Sahai, Brent Waters
8. Unconditionally Secure Multiparty Computation from Noisy Resources
Stefan Wolf, Jürg Wullschleger
9. Computationally Secure Authentication with Noisy Data
Berry Schoenmakers, Pim Tuyls
Part II. Applications of Security with Noisy Data
10. Privacy Enhancements for Inexact Biometric Templates
Nalini Ratha, Sharat Chikkerur, Jonathan Connell, Ruud Bolle
11. Protection of Biometric Information
Tom Kevenaar
12. On the Amount of Entropy in PUFs
Pim Tuyls, Boris Skoric
13. Entropy Estimation for Optical PUFs Based on Context-Tree Weighting Methods
Pim Tuyls, Boris Skoric, Tanya Ignatenko, Frans Willems, Geert-Jan Schrijen
14. Controlled Physical Random Functions
Blaise Gassend, Marten Dijk, Dwaine Clarke, Srinivas Devadas
15. Experimental Hardware for Coating PUFs and Optical PUFs
Boris Skoric, Geert-Jan Schrijen, Wil Ophey, Rob Wolters, Nynke Verhaegh, Jan Geloven
16. Secure Key Storage with PUFs
Boris Skoric, Geert-Jan Schrijen, Pim Tuyls, Tanya Ignatenko, Frans Willems
17. Anti-Counterfeiting
Pim Tuyls, Jorge Guajardo, Lejla Batina, Tim Kerins
DRM-restrictions
Printing: not available
Clipboard copying: not available
Avainsanat: COMPUTERS / Computer Science COM014000
- Tekijä(t)
- Kevenaar, Tom
- Skoric, Boris
- Tuyls, Pim
- Julkaisija
- Springer
- Julkaisuvuosi
- 2008
- Kieli
- en
- Painos
- 1
- Kategoria
- Tietotekniikka, tietoliikenne
- Tiedostomuoto
- E-kirja
- eISBN (PDF)
- 9781846289842