000 | 03266nam a22005055i 4500 | ||
---|---|---|---|
001 | 978-3-031-02335-4 | ||
003 | DE-He213 | ||
005 | 20240730165230.0 | ||
007 | cr nn 008mamaa | ||
008 | 220601s2012 sz | s |||| 0|eng d | ||
020 |
_a9783031023354 _9978-3-031-02335-4 |
||
024 | 7 |
_a10.1007/978-3-031-02335-4 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aKanade, Sanjay. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _987965 |
|
245 | 1 | 0 |
_aEnhancing Information Security and Privacy by Combining Biometrics with Cryptography _h[electronic resource] / _cby Sanjay Kanade, Dijana Petrovska-Delacretaz, Bernadette Dorizzi. |
250 | _a1st ed. 2012. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2012. |
|
300 |
_aXVIII, 122 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 |
|
505 | 0 | _aIntroduction -- Cancelable Biometric System -- Cryptographic Key Regeneration Using Biometrics -- Biometrics-Based Secure Authentication Protocols -- Concluding Remarks. | |
520 | _aThis book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto-biometrics, including review, cancelable biometrics, cryptographic key generation from biometrics, and crypto-biometric key sharing protocols. Because of the thorough treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy. Table of Contents: Introduction / Cancelable Biometric System / Cryptographic Key Regeneration Using Biometrics / Biometrics-Based Secure Authentication Protocols / Concluding Remarks. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aPetrovska-Delacretaz, Dijana. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _987968 |
|
700 | 1 |
_aDorizzi, Bernadette. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _987970 |
|
710 | 2 |
_aSpringerLink (Online service) _987972 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031012075 |
776 | 0 | 8 |
_iPrinted edition: _z9783031034633 |
830 | 0 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 _987973 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-02335-4 |
912 | _aZDB-2-SXSC | ||
942 | _cEBK | ||
999 |
_c86180 _d86180 |