Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Access
  • 1
    UID:
    gbv_728865289
    Format: 1 Online-Ressource (xviii, 122 Seiten) , Illustrationen
    Edition: Electronic reproduction; Available via World Wide Web
    ISBN: 9781608458486
    Series Statement: Synthesis lectures on information security, privacy and trust #3
    Content: This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto-biometrics, including review, cancelable biometrics, cryptographic key generation from biometrics, and crypto-biometric key sharing protocols. Because of the thorough treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy
    Content: 2. Cancelable biometric system -- 2.1 Introduction -- 2.2 Protection of biometric data, state of the art -- 2.3 A biometric data shuffling scheme to create cancelable biometric templates -- 2.4 Experimental results and security analysis of the proposed cancelable biometrics scheme -- 2.5 Conclusions and perspectives --
    Content: 3. Cryptographic key regeneration using biometrics -- 3.1 Introduction -- 3.2 Obtaining cryptographic keys with biometrics, state of the art -- 3.3 Biometrics-based key regeneration scheme -- 3.4 Adaptations of the proposed generalized key regeneration scheme for iris biometrics -- 3.5 Adaptations of the proposed generalized key regeneration scheme for face biometrics -- 3.6 Extension of the proposed key regeneration scheme to obtain constant length keys with higher entropy -- 3.7 Conclusions and perspectives --
    Content: 4. Biometrics-based secure authentication protocols -- 4.1 Introduction -- 4.2 Biometrics-based secure cryptographic protocols, state of the art -- 4.3 Biometrics-based cryptographic key regeneration and sharing -- 4.4 Biometrics-based session-key generation and sharing protocol -- 4.5 Conclusions and perspectives --
    Content: 5. Concluding remarks -- 5.1 Summary -- 5.2 Future research directions --
    Content: A. Baseline biometric systems, databases, and experimental protocols -- B. BioSecure tool for performance evaluation -- Bibliography -- Author's biography
    Content: Preface -- Acknowledgments -- Glossary -- 1. Introduction -- 1.1 Introduction to biometrics -- 1.2 Introduction to cryptography -- 1.3 Introduction to combination of biometrics and cryptography -- 1.4 Motivation and goals -- 1.5 Performance evaluation strategies --
    Note: Includes bibliographical references , 2. Cancelable biometric system -- 2.1 Introduction -- 2.2 Protection of biometric data, state of the art -- 2.3 A biometric data shuffling scheme to create cancelable biometric templates -- 2.4 Experimental results and security analysis of the proposed cancelable biometrics scheme -- 2.5 Conclusions and perspectives , 3. Cryptographic key regeneration using biometrics -- 3.1 Introduction -- 3.2 Obtaining cryptographic keys with biometrics, state of the art -- 3.3 Biometrics-based key regeneration scheme -- 3.4 Adaptations of the proposed generalized key regeneration scheme for iris biometrics -- 3.5 Adaptations of the proposed generalized key regeneration scheme for face biometrics -- 3.6 Extension of the proposed key regeneration scheme to obtain constant length keys with higher entropy -- 3.7 Conclusions and perspectives , 4. Biometrics-based secure authentication protocols -- 4.1 Introduction -- 4.2 Biometrics-based secure cryptographic protocols, state of the art -- 4.3 Biometrics-based cryptographic key regeneration and sharing -- 4.4 Biometrics-based session-key generation and sharing protocol -- 4.5 Conclusions and perspectives , 5. Concluding remarks -- 5.1 Summary -- 5.2 Future research directions , A. Baseline biometric systems, databases, and experimental protocols -- B. BioSecure tool for performance evaluation -- Bibliography -- Author's biography. , Preface -- Acknowledgments -- Glossary -- 1. Introduction -- 1.1 Introduction to biometrics -- 1.2 Introduction to cryptography -- 1.3 Introduction to combination of biometrics and cryptography -- 1.4 Motivation and goals -- 1.5 Performance evaluation strategies , Electronic reproduction; Available via World Wide Web , Mode of access: World Wide Web. , System requirements: Adobe Acrobat Reader.
    Additional Edition: ISBN 9781608458479
    Additional Edition: Erscheint auch als Druck-Ausgabe Enhancing Information Security and Privacy by Combining Biometrics with Cryptography
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_1653196467
    Format: XVIII, 122 S. , Ill., graph. Darst.
    Edition: Online-Ausg. Online-Ressource Synthesis digital library of engineering and computer science
    Edition: Computer & information science. collection four
    ISBN: 9781608458479
    Series Statement: Synthesis lectures on information security, privacy, and trust 3
    Additional Edition: ISBN 9781608458486
    Additional Edition: Erscheint auch als Online-Ausgabe Kanade, Sanjay G. Enhancing information security and privacy by combining biometrics with cryptography San Rafael, Calif? : Morgan & Claypool Publishers, 2011 ISBN 9781608458486
    Additional Edition: ISBN 9781608458479
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV040887550
    Format: XVIII, 122 S. , Ill., graph. Darst.
    ISBN: 9781608458479
    Series Statement: Synthesis lectures on information security, privacy and trust 3
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-1-60845-848-6
    Language: English
    Keywords: Datensicherung ; Kryptologie ; Biometrie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9781608453429?
Did you mean 9781108458979?
Did you mean 9781108958479?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages