£76.38

Springer Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting

Price data checked 1 day ago

View at Amazon

We'll watch every seller, every day. One email when your price arrives.

This is the most expensive it has ever been. Walk away.

£76 today · previous high £76 · all-time low £76

NEW HERE?

Amazon shows you one price. We show you all of them.

Tosheroon watches Amazon prices so you don't have to. Every product on Amazon has a price history — we make it visible. Set the price you'd actually pay, and we'll email you the second it gets there. No app, no account, one email.

WHAT'S ON THIS PAGE

↓ Price chart
when this has been cheap or pricey
↓ Forecast
where the price is heading next
↓ Statistics
all-time high & low, recent range
↑ Price alert
name your number, we'll email you

Price History & Forecast

Grey patches = out of stock. Cheaper = lower on the chart. Hover for exact prices.

Last 90 days • 90 data points

Historical
Generating forecast...
£76.38 £75.61 £75.78 £75.95 £76.11 £76.28 £76.45 18 February 2026 12 March 2026 03 April 2026 25 April 2026 18 May 2026

Price Distribution

Price distribution over 90 days • 1 price levels

Days at Price
90 days 0 23 45 68 90 £76 Days at Price

Price Analysis

Most common price: £76 (90 days, 100.0%)

Price range: £76 - £76

Price levels: 1 different prices over 90 days

Description

Product Description Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting. Review "This is a fascinating text for those interested in, and prepared to explore, the latest developments in information security. It is a difficult read for the casual reader, but for the technically savvy security professional interested in the latest developments in biometrics, key security, and anti-counterfeiting, this book should be required reading."Charles K. Davis, ACM Computing Reviews, February 2009) From the Back Cover Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human beings, or physical structures, such as physical unclonable functions. This book examines how the presence of noise has an impact on information security, describes how it can be dealt with and possibly used to generate an advantage over traditional approaches, and provides a self-contained overview of the techniques and applications of security based on noisy data. Security with Noisy Data thoroughly covers the theory of authentication based on noisy data and shows it in practice as a key tool for preventing counterfeiting. Part I discusses security primitives that allow noisy inputs, and Part II focuses on the practical applications of the methods discussed in the first part. Key features: • Contains algorithms to derive secure keys from noisy data, in particular from physical unclonable functions and biometrics - as well as the theory proving that those algorithms are secure • Offers practical implementations of algorithms, including techniques that give insight into system security • Includes an overview and detailed description of new applications made possible by using these new algorithms • Discusses recent theoretical as well as application-oriented developments in the field, combining noisy data with cryptography • Describes the foundations of the subject in a clear, accessible and reader-friendly style • Presents the principles of key establishment and multiparty computation over noisy channels • Provides a detailed overview of the building blocks of cryptography for noisy data and explains how these techniques can be applied, (for example as anti-counterfeiting and key storage) • Introduces privacy protected biometric systems, analyzes the theoretical and practical properties of PUFs and discusses PUF based systems • Addresses biometrics and physical unclonable functions extensively This comprehensive introduction offers an excellent foundation to graduate students and researchers entering the field, and will also benefit professionals needing to expand their knowledge. Readers will gain a well-rounded and broad understanding of the topic through the insight it provides into both theory and practice. Pim Tuyls is a Principal Scientist at Philips Research and a Visiting Professor at the COSIC Department of the Katholieke Universiteit of Leuven, Dr Boris Skoric and Dr Tom Kevenaar are research scientists at Philips Research Laboratories, Eindhoven.

Product Specifications

Format
paperback
Domain
Amazon UK
Release Date
13 October 2010
Listed Since
20 September 2010

Barcode

No barcode data available

Similar Products You Might Like

Security and Privacy in Biometrics
84% match

Security and Privacy in Biometrics

Springer

£76.38 18 May 2026
Hardware Security Primitives
81% match

Hardware Security Primitives

Springer

£78.41 18 May 2026
Imaging for Forensics and Security: From Theory to Practice (Signals and Communication Technology)
81% match

Imaging for Forensics and Security: From Theory to Practice (Signals and Communication Technology)

Springer

£75.68 18 May 2026
Biometric Security and Privacy: Opportunities & Challenges in The Big Data Era (Signal Processing for Security Technologies)
81% match

Biometric Security and Privacy: Opportunities & Challenges in The Big Data Era (Signal Processing for Security Technologies)

Springer

£107.98 18 May 2026
Optical and Digital Techniques for Information Security: 1 (Advanced Sciences and Technologies for Security Applications, 1)
81% match

Optical and Digital Techniques for Information Security: 1 (Advanced Sciences and Technologies for Security Applications, 1)

Springer

£73.85 18 May 2026
Security and Privacy for Next-Generation Wireless Networks
81% match

Security and Privacy for Next-Generation Wireless Networks

Springer

£73.10 19 May 2026
Biometric User Authentication for IT Security: From Fundamentals to Handwriting: 18 (Advances in Information Security, 18)
80% match

Biometric User Authentication for IT Security: From Fundamentals to Handwriting: 18 (Advances in Information Security, 18)

Springer

£76.38 18 May 2026
Handbook of Remote Biometrics: for Surveillance and Security (Advances in Computer Vision and Pattern Recognition)
80% match

Handbook of Remote Biometrics: for Surveillance and Security (Advances in Computer Vision and Pattern Recognition)

Springer

£107.98 18 May 2026
Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments (Advanced Sciences and Technologies for Security Applications)
79% match

Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments (Advanced Sciences and Technologies for Security Applications)

Springer

£74.56 18 May 2026
Optical Imaging Sensors and Systems for Homeland Security Applications: 2 (Advanced Sciences and Technologies for Security Applications, 2)
79% match

Optical Imaging Sensors and Systems for Homeland Security Applications: 2 (Advanced Sciences and Technologies for Security Applications, 2)

Springer

£107.98 11 May 2026
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications: 68 (Advances in Information Security, 68)
79% match

Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications: 68 (Advances in Information Security, 68)

Springer

£72.86 18 May 2026
Denoising of Photographic Images and Video: Fundamentals, Open Challenges and New Trends (Advances in Computer Vision and Pattern Recognition)
79% match

Denoising of Photographic Images and Video: Fundamentals, Open Challenges and New Trends (Advances in Computer Vision and Pattern Recognition)

Springer

£76.82 11 May 2026
Security of e-Systems and Computer Networks
79% match

Security of e-Systems and Computer Networks

Cambridge University Press

£56.73 15 May 2026
Why Cryptography Should Not Rely on Physical Attack Complexity (T-Labs Series in Telecommunication Services)
79% match

Why Cryptography Should Not Rely on Physical Attack Complexity (T-Labs Series in Telecommunication Services)

Springer

£73.38 18 May 2026
Speaker Authentication (Signals and Communication Technology)
79% match

Speaker Authentication (Signals and Communication Technology)

Springer

£108.18 11 May 2026
Cyber-Physical Systems: Architecture, Security and Application (EAI/Springer Innovations in Communication and Computing)
79% match

Cyber-Physical Systems: Architecture, Security and Application (EAI/Springer Innovations in Communication and Computing)

Springer

£102.46 18 May 2026
Network Security
79% match

Network Security

Springer

£83.37 11 May 2026
Information Security: Principles and Practice
79% match

Information Security: Principles and Practice

Wiley

£57.56 04 May 2026
Collaborative Approaches for Cyber Security in Cyber-Physical Systems (Advanced Sciences and Technologies for Security Applications)
78% match

Collaborative Approaches for Cyber Security in Cyber-Physical Systems (Advanced Sciences and Technologies for Security Applications)

Springer

£97.00 18 May 2026
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
78% match

Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

Springer

£76.38 18 May 2026
Automated Biometrics: Technologies and Systems: 7 (The International Series on Asian Studies in Computer and Information Science, 7)
78% match

Automated Biometrics: Technologies and Systems: 7 (The International Series on Asian Studies in Computer and Information Science, 7)

Springer

£113.77 18 May 2026
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
78% match

Biometric System and Data Analysis: Design, Evaluation, and Data Mining

Springer

£107.98 18 May 2026
Secure Broadcast Communication: In Wired and Wireless Networks
78% match

Secure Broadcast Communication: In Wired and Wireless Networks

Springer

£76.38 18 May 2026
Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, ... and Communication Technology, 181)
78% match

Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, ... and Communication Technology, 181)

Springer

£120.88 18 May 2026