Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Digital Fingerprinting -

Digital Fingerprinting (eBook)

eBook Download: PDF
2016 | 1st ed. 2016
IX, 189 Seiten
Springer New York (Verlag)
978-1-4939-6601-1 (ISBN)
Systemvoraussetzungen
106,99 inkl. MwSt
(CHF 104,50)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more.  Available techniques for assurance are limited and authentication schemes are potentially vulnerable to the theft of digital tokens or secrets.  Intrusion detection can be thwarted by spoofing or impersonating devices, and forensic analysis is incapable of demonstrably tying a particular device to specific digital evidence.  This book presents an innovative and effective approach that addresses these concerns.  

This book introduces the origins and scientific underpinnings of digital fingerprinting. It also proposes a unified framework for digital fingerprinting, evaluates methodologies and includes examples and case studies. The last chapter of this book covers the future directions of digital fingerprinting. 

This book is designed for practitioners and researchers working in the security field and military. Advanced-level students focused on computer science and engineering will find this book beneficial as secondary textbook or reference. 




Ryan M. Gerdes is an assistant professor of Electrical and Computer Engineering at Virginia Polytechnic Institute. His interests include signal and data authentication, hardware and device security, computer and network security, transportation security, and applied electromagnetics.

Yong Guan is an associate professor at Iowa State University. His research and teaching are in computer networks and distributed systems, with focuses on security issues, including computer and network forensics, wireless and sensor network security, privacy-enhancing technologies for the Internet, and secure real-time computing and communication.

Sneha Kumar Kasera is a professor in the School of Computing at the University of Utah. Before joining the University of Utah, he spent four years in the Mobile Networking Research Department at Bell Labs, Lucent Technologies. Earlier, I obtained a Ph.D. in Computer Science from the Advanced Networks Research Group at the University of Massachusetts in Amherst. 

Cliff Wang is the program director at US Army Research Office, managing a large portfolio of university research. He is also appointed as an adjunct professor at North Carolina State University. Dr. Wang is a fellow of IEEE.



This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more.  Available techniques for assurance are limited and authentication schemes are potentially vulnerable to the theft of digital tokens or secrets.  Intrusion detection can be thwarted by spoofing or impersonating devices, and forensic analysis is incapable of demonstrably tying a particular device to specific digital evidence.  This book presents an innovative and effective approach that addresses these concerns.  This book introduces the origins and scientific underpinnings of digital fingerprinting. It also proposes a unified framework for digital fingerprinting, evaluates methodologies and includes examples and case studies. The last chapter of this book covers the future directions of digital fingerprinting. This book is designed for practitioners and researchers working in the security field and military. Advanced-level students focused on computer science and engineering will find this book beneficial as secondary textbook or reference. 

Ryan M. Gerdes is an assistant professor of Electrical and Computer Engineering at Virginia Polytechnic Institute. His interests include signal and data authentication, hardware and device security, computer and network security, transportation security, and applied electromagnetics.Yong Guan is an associate professor at Iowa State University. His research and teaching are in computer networks and distributed systems, with focuses on security issues, including computer and network forensics, wireless and sensor network security, privacy-enhancing technologies for the Internet, and secure real-time computing and communication.Sneha Kumar Kasera is a professor in the School of Computing at the University of Utah. Before joining the University of Utah, he spent four years in the Mobile Networking Research Department at Bell Labs, Lucent Technologies. Earlier, I obtained a Ph.D. in Computer Science from the Advanced Networks Research Group at the University of Massachusetts in Amherst. Cliff Wang is the program director at US Army Research Office, managing a large portfolio of university research. He is also appointed as an adjunct professor at North Carolina State University. Dr. Wang is a fellow of IEEE.

Introduction.- Types and Origins of Fingerprints.- Device Measurement and Origin of Variation.- Crypto-based Methods and Fingerprints.- Fingerprinting by Design: Embedding and Authentication.- Digital Fingerprint: A Practical Hardware Security Primitive.- Operating System Fingerprinting.- Secure and Trustworthy Provenance Collection for Digital Forensics.- Conclusion.

Erscheint lt. Verlag 25.10.2016
Zusatzinfo IX, 189 p. 46 illus.
Verlagsort New York
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Schlagworte Authentication and Access Control • Crypto-Based Methods • Device Measurement • digital fingerprinting • Digital tokens • Embedding • Forensics • hardware security • Intrusion Detection • Origin of Variation • Physical Device Identification • Provenance Collection • security • Spoofing
ISBN-10 1-4939-6601-4 / 1493966014
ISBN-13 978-1-4939-6601-1 / 9781493966011
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 5,4 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
CHF 78,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95