Digital Fingerprinting

This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Available techniques for assurance are limited and authentication schemes...

Full description

Bibliographic Details
Other Authors: Wang, Cliff (Editor), Gerdes, Ryan M. (Editor), Guan, Yong (Editor), Kasera, Sneha Kumar (Editor)
Format: eBook
Language:English
Published: New York, NY Springer New York 2016, 2016
Edition:1st ed. 2016
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02665nmm a2200337 u 4500
001 EB001265808
003 EBX01000000000000000880392
005 00000000000000.0
007 cr|||||||||||||||||||||
008 161103 ||| eng
020 |a 9781493966011 
100 1 |a Wang, Cliff  |e [editor] 
245 0 0 |a Digital Fingerprinting  |h Elektronische Ressource  |c edited by Cliff Wang, Ryan M. Gerdes, Yong Guan, Sneha Kumar Kasera 
250 |a 1st ed. 2016 
260 |a New York, NY  |b Springer New York  |c 2016, 2016 
300 |a IX, 189 p. 46 illus  |b online resource 
505 0 |a Introduction -- Types and Origins of Fingerprints -- Device Measurement and Origin of Variation -- Crypto-based Methods and Fingerprints -- Fingerprinting by Design: Embedding and Authentication -- Digital Fingerprint: A Practical Hardware Security Primitive -- Operating System Fingerprinting -- Secure and Trustworthy Provenance Collection for Digital Forensics -- Conclusion 
653 |a Computer security 
653 |a Biometrics (Biology) 
653 |a Cryptology 
653 |a Biometrics 
653 |a Data encryption (Computer science) 
653 |a Systems and Data Security 
700 1 |a Gerdes, Ryan M.  |e [editor] 
700 1 |a Guan, Yong  |e [editor] 
700 1 |a Kasera, Sneha Kumar  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
856 4 0 |u https://doi.org/10.1007/978-1-4939-6601-1?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Available techniques for assurance are limited and authentication schemes are potentially vulnerable to the theft of digital tokens or secrets. Intrusion detection can be thwarted by spoofing or impersonating devices, and forensic analysis is incapable of demonstrably tying a particular device to specific digital evidence. This book presents an innovative and effective approach that addresses these concerns. This book introduces the origins and scientific underpinnings of digital fingerprinting. It also proposes a unified framework for digital fingerprinting, evaluates methodologies and includes examples and case studies. The last chapter of this book covers the future directions of digital fingerprinting. This book is designed for practitioners and researchers working in the security field and military. Advanced-level students focused on computer science and engineering will find this book beneficial as secondary textbook or reference.