募捐 9月15日2024 – 10月1日2024 关于筹款

Security Engineering For Service-Oriented Architectures

Security Engineering For Service-Oriented Architectures

Pim Tuyls, Boris Skoric, Tom Kevenaar
你有多喜欢这本书?
下载文件的质量如何?
下载该书,以评价其质量
下载文件的质量如何?
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting.
年:
2008
出版社:
Springer
语言:
english
页:
248
ISBN 10:
1846289831
ISBN 13:
9781846289835
文件:
PDF, 16.89 MB
IPFS:
CID , CID Blake2b
english, 2008
因版权方投诉,本书无法下载

Beware of he who would deny you access to information, for in his heart he dreams himself your master

Pravin Lal

关键词