000 03213nam a22005175i 4500
001 978-1-4939-6601-1
003 DE-He213
005 20200421111853.0
007 cr nn 008mamaa
008 161025s2016 xxu| s |||| 0|eng d
020 _a9781493966011
_9978-1-4939-6601-1
024 7 _a10.1007/978-1-4939-6601-1
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
245 1 0 _aDigital Fingerprinting
_h[electronic resource] /
_cedited by Cliff Wang, Ryan M. Gerdes, Yong Guan, Sneha Kumar Kasera.
264 1 _aNew York, NY :
_bSpringer New York :
_bImprint: Springer,
_c2016.
300 _aIX, 189 p. 46 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction -- Types and Origins of Fingerprints -- Device Measurement and Origin of Variation -- Crypto-based Methods and Fingerprints -- Fingerprinting by Design: Embedding and Authentication -- Digital Fingerprint: A Practical Hardware Security Primitive -- Operating System Fingerprinting -- Secure and Trustworthy Provenance Collection for Digital Forensics -- Conclusion.
520 _aThis is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Available techniques for assurance are limited and authentication schemes are potentially vulnerable to the theft of digital tokens or secrets. Intrusion detection can be thwarted by spoofing or impersonating devices, and forensic analysis is incapable of demonstrably tying a particular device to specific digital evidence. This book presents an innovative and effective approach that addresses these concerns. This book introduces the origins and scientific underpinnings of digital fingerprinting. It also proposes a unified framework for digital fingerprinting, evaluates methodologies and includes examples and case studies. The last chapter of this book covers the future directions of digital fingerprinting. This book is designed for practitioners and researchers working in the security field and military. Advanced-level students focused on computer science and engineering will find this book beneficial as secondary textbook or reference. .
650 0 _aComputer science.
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 0 _aBiometrics (Biology).
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aBiometrics.
650 2 4 _aData Encryption.
700 1 _aWang, Cliff.
_eeditor.
700 1 _aGerdes, Ryan M.
_eeditor.
700 1 _aGuan, Yong.
_eeditor.
700 1 _aKasera, Sneha Kumar.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781493965991
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4939-6601-1
912 _aZDB-2-SCS
942 _cEBK
999 _c56220
_d56220