LEADER 03659nam 22005535 450 001 9910148572603321 005 20200702085241.0 024 7 $a10.1007/978-1-4939-6601-1 035 $a(CKB)3710000000918063 035 $a(DE-He213)978-1-4939-6601-1 035 $a(MiAaPQ)EBC4728171 035 $a(PPN)196320879 035 $a(EXLCZ)993710000000918063 100 $a20161025d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Fingerprinting /$fedited by Cliff Wang, Ryan M. Gerdes, Yong Guan, Sneha Kumar Kasera 205 $a1st ed. 2016. 210 1$aNew York, NY :$cSpringer New York :$cImprint: Springer,$d2016. 215 $a1 online resource (IX, 189 p. 46 illus.) 311 $a1-4939-6599-9 311 $a1-4939-6601-4 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aIntroduction -- Types and Origins of Fingerprints -- Device Measurement and Origin of Variation -- Crypto-based Methods and Fingerprints -- Fingerprinting by Design: Embedding and Authentication -- Digital Fingerprint: A Practical Hardware Security Primitive -- Operating System Fingerprinting -- Secure and Trustworthy Provenance Collection for Digital Forensics -- Conclusion. 330 $aThis is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Available techniques for assurance are limited and authentication schemes are potentially vulnerable to the theft of digital tokens or secrets. Intrusion detection can be thwarted by spoofing or impersonating devices, and forensic analysis is incapable of demonstrably tying a particular device to specific digital evidence. This book presents an innovative and effective approach that addresses these concerns. This book introduces the origins and scientific underpinnings of digital fingerprinting. It also proposes a unified framework for digital fingerprinting, evaluates methodologies and includes examples and case studies. The last chapter of this book covers the future directions of digital fingerprinting. This book is designed for practitioners and researchers working in the security field and military. Advanced-level students focused on computer science and engineering will find this book beneficial as secondary textbook or reference. . 606 $aComputer security 606 $aBiometrics (Biology) 606 $aData encryption (Computer science) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aBiometrics$3https://scigraph.springernature.com/ontologies/product-market-codes/I22040 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 615 0$aComputer security. 615 0$aBiometrics (Biology). 615 0$aData encryption (Computer science). 615 14$aSystems and Data Security. 615 24$aBiometrics. 615 24$aCryptology. 676 $a005.8 702 $aWang$b Cliff$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGerdes$b Ryan M$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGuan$b Yong$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKasera$b Sneha Kumar$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910148572603321 996 $aDigital Fingerprinting$92158931 997 $aUNINA