Normal view MARC view ISBD view

Digital Fingerprinting [electronic resource] / edited by Cliff Wang, Ryan M. Gerdes, Yong Guan, Sneha Kumar Kasera.

Contributor(s): Wang, Cliff [editor.] | Gerdes, Ryan M [editor.] | Guan, Yong [editor.] | Kasera, Sneha Kumar [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookPublisher: New York, NY : Springer New York : Imprint: Springer, 2016Description: IX, 189 p. 46 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9781493966011.Subject(s): Computer science | Computer security | Data encryption (Computer science) | Biometrics (Biology) | Computer Science | Systems and Data Security | Biometrics | Data EncryptionAdditional physical formats: Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Introduction -- Types and Origins of Fingerprints -- Device Measurement and Origin of Variation -- Crypto-based Methods and Fingerprints -- Fingerprinting by Design: Embedding and Authentication -- Digital Fingerprint: A Practical Hardware Security Primitive -- Operating System Fingerprinting -- Secure and Trustworthy Provenance Collection for Digital Forensics -- Conclusion.
In: Springer eBooksSummary: This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Available techniques for assurance are limited and authentication schemes are potentially vulnerable to the theft of digital tokens or secrets. Intrusion detection can be thwarted by spoofing or impersonating devices, and forensic analysis is incapable of demonstrably tying a particular device to specific digital evidence. This book presents an innovative and effective approach that addresses these concerns. This book introduces the origins and scientific underpinnings of digital fingerprinting. It also proposes a unified framework for digital fingerprinting, evaluates methodologies and includes examples and case studies. The last chapter of this book covers the future directions of digital fingerprinting. This book is designed for practitioners and researchers working in the security field and military. Advanced-level students focused on computer science and engineering will find this book beneficial as secondary textbook or reference. .
    average rating: 0.0 (0 votes)
No physical items for this record

Introduction -- Types and Origins of Fingerprints -- Device Measurement and Origin of Variation -- Crypto-based Methods and Fingerprints -- Fingerprinting by Design: Embedding and Authentication -- Digital Fingerprint: A Practical Hardware Security Primitive -- Operating System Fingerprinting -- Secure and Trustworthy Provenance Collection for Digital Forensics -- Conclusion.

This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Available techniques for assurance are limited and authentication schemes are potentially vulnerable to the theft of digital tokens or secrets. Intrusion detection can be thwarted by spoofing or impersonating devices, and forensic analysis is incapable of demonstrably tying a particular device to specific digital evidence. This book presents an innovative and effective approach that addresses these concerns. This book introduces the origins and scientific underpinnings of digital fingerprinting. It also proposes a unified framework for digital fingerprinting, evaluates methodologies and includes examples and case studies. The last chapter of this book covers the future directions of digital fingerprinting. This book is designed for practitioners and researchers working in the security field and military. Advanced-level students focused on computer science and engineering will find this book beneficial as secondary textbook or reference. .

There are no comments for this item.

Log in to your account to post a comment.