Dissertations / Theses on the topic 'Fingerprinting'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Fingerprinting.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Strobel, Cornelia. "Fuzzy Fingerprinting." Universitätsbibliothek Chemnitz, 2005. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200500106.
Full textFingerabdrücke besitzen sowohl in der Kryptographie als auch in der Biometrie eine große Bedeutung. In kryptographischen Anwendungen werden diese durch Einweg-Hash-Verfahren erzeugt, die für bestimmte Anwendungen auch kollisionsresitent sein müssen. In der Praxis schenken Benutzer diesen Fingerprints weit weniger Aufmerksamkeit - oft genügt es nur hinreichend ähnliche Fingerprints auszugeben, um die Nutzer zu täuschen Die Kriterien, die dabei erfüllt sein müssen und die Erzeugung dieser "Fuzzy Fingerprints" sind Hauptbestandteil dieses Vortrags. Durch die Demonstration eines Tools im praktischen Einsatz wird dieser abgeschlossen
Kristoffer, Frisell. "FINGERPRINTING AV HÅRDVARULIKA ENHETER : Precisionsmätning med fingerprinting på mobila enheter." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-10052.
Full textEllch, Jonathan P. "Fingerprinting 802.11 devices." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FEllch.pdf.
Full textThesis Advisor(s): Dennis Volpano and Chris Eagle. "September 2006." Includes bibliographical references (p. 67). Also available in print.
Kim, Joonsoo. "Reliable SRAM Fingerprinting." Thesis, The University of Texas at Austin, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3572874.
Full textDevice identification, as human identification has been, has become critical to mitigate growing security problems. In the era of ubiquitous computing, it is important to ensure universal device identities that are versatile in number of ways, for example, to enhance computer security or to enable large-scale data capture, management and analysis. For device identities, simple labeling works only if they are properly managed under a highly controlled environment. We can also impose hard-coded serial numbers into non-volatile memories but it is well known that this is expensive and vulnerable to security attacks. Hence, it is desirable to develop reliable and secure device identification methods using fingerprint-like characteristics of the electronic devices.
As technology scales, process variation has become the most critical barrier to overcome for modern chip development. Ironically, there are some research works to exploit the aggressive process variation for the identification of individual devices. They find measurable physical characteristics that are unique to each integrated circuit. Among them, device identification using initial power-up values of SRAM cells, called SRAM fingerprints, has been emphasized lately in part due to the abundant availability of SRAM cells in modern microprocessors. More importantly, since the cross-coupled inverter structure of each SRAM cell amplifies even the small mismatches between two inverter nodes, it is thus very sensitive to and maximizes the effect of random process variation, making SRAM fingerprints to acquire great features as a naturally inherent device ID.
Therefore, this work focuses on achieving reliable device identification using SRAM fingerprints. As of date, this dissertation shows the most comprehensive feature characterization of SRAM fingerprints based on the large datasets measured from the real devices under various environmental conditions. SRAM fingerprints in three different process technologies—IBM 32nm SOI technology, IBM 65nm bulk technology, and TSMC 90nm low-k dielectric technology—have been investigated across different temperatures or voltages. By using formal statistical tools, the required features for SRAM fingerprints necessary to be usable as device IDs—uniqueness, randomness, independence, reproducibility, etc.—have been empirically proven.
As some of the previous works mentioned, there is an inherent unreliability of the initial states of SRAM cells so that there is always some chance of errors during identification process. It is observed that, under environmental variations, the instability aggravates even more. Most of the previous work, however, ignores the temperature dependence of the SRAM power-up values, which turns out to be critical against our past speculations and becomes a real challenge in realizing a reliable SRAM-based device identification. Note that temperature variation will not be negligible in many situations, for example, authentication of widely distributed sensors.
We show that it is possible to achieve SRAM-based device identification system that reliably operates under a wide range of temperatures. The proposed system is composed of three major steps: enrollment, system evaluation, and matching. During the enrollment process, power-up samples of SRAM fingerprints are captured from each manufactured device and the feature information or characterization identifier (CID) is characterized to generate a representative fingerprint value associated with the product device. By collecting the samples and the CIDs, system database gets constructed before distributing devices to the field. During the matching process, we take a single sample fingerprint of a power-cycle experiment, the field identifier (FID), and perform a match against a repository of CID’s of all manufactured devices. There is an additional monitoring subsystem, called system evaluation, that estimates the system accuracy with the system database. It controls the system parameters while maintaining the system accuracy requirement.
This work delivers a total-package statistical framework that raises design issues of each step and provides systematic solutions to deal with these inter-related issues. We provide statistical methods to determine sample size for the enrollment of chip identities, to generate the representative fingerprint features with the limited number of test samples, and to estimate the system performance along with the proposed system parameter values and the confidence interval of the estimation. A novel matching scheme is proposed to improve the system accuracy and increase population coverage under environmental variations, especially temperature variation. Several advanced mechanisms to exploit the instability for our benefit is also discussed along with supporting state-of-the-art circuit technologies. All these pioneering theoretical frameworks have been validated by the comprehensive empirical analysis based on the real SRAM fingerprint datasets introduced earlier.
The main contribution here is that this work provides a comprehensive interdisciplinary framework to enable reliable SRAM fingerprinting, even if the fingerprint, depending on ambient conditions, exhibits nondeterministic behaviors. Furthermore, the interdisciplinary bases introduced in our work are expected to provide generic fundamental methodologies that apply to device fingerprints in general, not just to SRAM fingerprints. (Abstract shortened by UMI.)
MA, DAN. "Magnetic Resonance Fingerprinting." Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1426170542.
Full textLiu, Hui Qing 1957. "Fingerprinting biological materials." Thesis, The University of Arizona, 1992. http://hdl.handle.net/10150/291369.
Full textKarlsson, Anna. "Device Sensor Fingerprinting : Mobile Device Sensor Fingerprinting With A Biometric Approach." Thesis, Linköpings universitet, Informationskodning, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119341.
Full textLöfvenberg, Jacob. "Codes for digital fingerprinting /." Linköping : Univ, 2001. http://www.bibl.liu.se/liupubl/disp/disp2001/tek722s.pdf.
Full textLindkvist, Tina. "Fingerprinting of digital documents /." Linköping : Univ, 2001. http://www.bibl.liu.se/liupubl/disp/disp2001/tek706s.pdf.
Full textPorter, Alastair. "Evaluating musical fingerprinting systems." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=117191.
Full textLe système d'empreinte audio est un procédé qui analyse de courts extraits de musique avec un ordinateur pour répondre à une question courante: « Quelle est le nom de cette chanson que j'écoute? ». Les systèmes d'empreintes audio identifient le contenu musical d'un enregistrement et cherchent des documents sonores possédant les même traits musicaux au sein d'une base de données de référence. Ces systèmes sont capables de fonctionner même si les requêtes qui leur sont transmises sont enregistrées dans un espace public, avec de nombreuses sources de bruit extérieur. Les différents algorithmes d'empreinte audio se distinguent par le type de requête qu'ils peuvent traiter: certains se concentrent sur des requêtes de courte durée, d'autres sont optimisés pour pouvoir être performant même dans des conditions de bruit très défavorables. Dans la littérature, il existe peu d'études comparatives poussées traitant spécifiquement des performances des systèmes de reconnaissance par empreinte audio dans un large éventail de cas.Cette thèse présente une vue d'ensemble de l'histoire du développement des systèmes d'empreinte audio. Cette thèse introduit en suite des facteurs qui doivent être pris en compte lors de l'évaluation comparative de plusieurs algorithmes pour la reconnaissance par empreinte audio. De plus, ce travail présente un nouveau cadre d'évaluation développé afin d'incorporer ces facteurs. Cette thèse combine les résultats d'une comparaison à grande échelle de trois algorithmes d'identification d'empreinte audio avec une analyse recommandant lequel de ces algorithmes est le plus efficace pour identifier la plus grande variété d'extraits audio.
Berg, Alfred, and Norton Lamberg. "Automatic fingerprinting of websites." Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-278052.
Full textSammanfattningAtt ta fingeravtryck av en hemsida innebär att identifiera vilka teknologier som enhemsida använder, såsom dess webbapplikationer och JavaScript-ramverk.Nuvarande metoder för att göra fingeravtryckningar av hemsidor använder sig avmanuellt skapade fingeravtryck för varje teknologi som de letar efter. Dessafingeravtryck består av flera textsträngar som matchas mot HTTP-svar frånhemsidor. Att skapa fingeravtryck kan vara en tidskrävande process vilketbegränsar vilka teknologier som fingeravtryck kan skapas för. Den här rapportenpresenterar en potentiell lösning genom att utnyttja oövervakademaskininlärningstekniker för att klustra hemsidor efter vilka webbapplikationeroch JavaScript-ramverk som används, utan att manuellt skapa fingeravtryck. Dettauppnås genom att använda flera ordvektormodeller tillsammans meddimensionalitetreducerings-tekniken t-SNE och klustringsalgoritmen OPTICS.Resultatet visar att vissa teknologier, till exempel Drupal, får en precision på 0,731och en recall på 0,485 utan någon träningsdata. Detta leder till slutsatsen att denföreslagna lösningen möjligtvis kan användas för att klustra hemsidor efter dewebbapplikationer och JavaScript-ramverk som används. Men mera arbete behövsför att öka precision och recall av resultaten.NyckelordKlustring, fingeravtryckning, OPTICS, t-SNE, huvudlös webbläsare, ordvektor,oövervakad maskininlärnin g
Izadinia, Vafa Dario. "Fingerprinting Encrypted Tunnel Endpoints." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/25351.
Full textDissertation (MSc (Computer Science))--University of Pretoria, 2005.
Computer Science
unrestricted
Strömbom, Johannes. "Natural Fingerprinting of Steel." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85531.
Full textHöglund, Salomon. "Informing Users About Fingerprinting." Thesis, Södertörns högskola, Medieteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-38592.
Full textSjälvständigt Examensarbete (Forskningsartikel)
Toonstra, Jason Paul. "A radio transmitter fingerprinting system." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp04/mq23529.pdf.
Full textRadhakrishnan, Sakthi Vignesh. "A framework for system fingerprinting." Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47609.
Full textRoring, Solvig Mary Margaret. "DNA fingerprinting of Mycobacterium bovis." Thesis, Queen's University Belfast, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.287426.
Full textLuangmaneerote, Sakchan. "Defences against browser fingerprinting techniques." Thesis, University of Southampton, 2018. https://eprints.soton.ac.uk/427361/.
Full textMohamed, Azmin Nor Fadhillah. "Fingerprinting of complex bioprocess data." Thesis, University of Newcastle upon Tyne, 2013. http://hdl.handle.net/10443/2079.
Full textAndrews, Seth Dixon. "Extensions to Radio Frequency Fingerprinting." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/95952.
Full textDoctor of Philosophy
Radio frequency fingerprinting allows uniquely identifying a transmitter based on characteristics of the signal it emits. In this dissertation several extensions to current fingerprinting techniques are given. Together, these allow identification of transmitters which have changed the signal sent, identifying using different measurement types, and compensating for variation in a transmitter's behavior due to changes in temperature.
King, Joseph. "Analysis and Fingerprinting of Glycosaminoglycans." VCU Scholars Compass, 2011. http://scholarscompass.vcu.edu/etd/2524.
Full textBolin, Tobias. "Device fingerprinting: Conformance test av HTML5." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-11024.
Full textSalter, James William Computer Science & Engineering Faculty of Engineering UNSW. "802.11 positioning using signal strength fingerprinting." Publisher:University of New South Wales. Computer Science & Engineering, 2008. http://handle.unsw.edu.au/1959.4/43353.
Full textLee, Kung-Chung. "Localization systems using signal strength fingerprinting." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/28750.
Full textRochanakul, Penying. "Fingerprinting codes and separating hash families." Thesis, Royal Holloway, University of London, 2013. http://repository.royalholloway.ac.uk/items/464834d6-82c2-e1d2-e15f-92cf228d9704/7/.
Full textDonaldson, John P. "Source fingerprinting in adobe PDF files." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/38919.
Full textAdobe Portable Document Format (PDF) documents are increasingly used as a vector for targeted attacks. Although there exist a number of tools and methodologies for performing content-level analysis to identify unwanted or malicious behavior or characteristics in these documents, these forms of analysis are hampered by increasingly complex obfuscation techniques and usually require execution of potentially malicious code. This thesis proposes a static analysis method that uses structural elements of PDF documents to identify the tools used to generate them. This method may be used to attribute malicious PDFs to particular toolkits.
Zhu, Jiahui. "DNA fingerprinting in Oryza sativa L." Thesis, University of East Anglia, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338095.
Full textKara, Danielle Christine. "Understanding Error in Magnetic Resonance Fingerprinting." Case Western Reserve University School of Graduate Studies / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=case1521406087127691.
Full textAndriamilanto, Tompoariniaina Nampoina. "Leveraging browser fingerprinting for web authentication." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S045.
Full textWeb authentication is the verification that a visitor claiming an account legitimately owns this account. Several authentication factors were proposed such that each one provides a supplementary security barrier. Browser fingerprints notably came out as a promising candidate. They are the aggregation of properties collected from a web browser, which compose a potentially unique fingerprint. In this thesis, we provide two contributions. We investigate the adequacy of browser fingerprints for web authentication. We make the link between the digital fingerprints that distinguish browsers, and the biological fingerprints that distinguish Humans, to evaluate browser fingerprints according to properties inspired by biometric authentication factors. We assess these properties on four real-life browser fingerprint datasets, which include one of nearly two million browsers. We propose FPSelect, an attribute selection framework to find the attribute set that satisfies a security requirement and reduces the usability cost. The security is measured as the proportion of impersonated users given a fingerprinting probe, a user population, and a modeled attacker. The usability is quantified by the collection time of browser fingerprints, their size, and their instability. We compare our framework with common baselines using on two real-life fingerprint datasets
Reyes, Omar Costilla. "Dynamic WIFI Fingerprinting Indoor Positioning System." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699843/.
Full textMorgan, Matthew Philip. "Immune fingerprinting in acute severe sepsis." Thesis, Cardiff University, 2014. http://orca.cf.ac.uk/70408/.
Full textDerksen, Linda Anne. "Agency and structure in the history of DNA profiling : the stabilization and standardization of a new technology /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC IP addresses, 2003. http://wwwlib.umi.com/cr/ucsd/fullcit?p3083460.
Full textKaltenbach, Hans-Michael. "Statistics and algorithms for peptide mass fingerprinting." [S.l.] : [s.n.], 2007. http://deposit.ddb.de/cgi-bin/dokserv?idn=983903395.
Full textZhao, Hong. "Multimedia fingerprinting for multiuser forensics and security." College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/2068.
Full textThesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Hou, Shuhui. "Anti-Collusion Fingerprinting for Multimedia Content Protection." 京都大学 (Kyoto University), 2009. http://hdl.handle.net/2433/123841.
Full textMucsi-Nagy, Agnes. "Digital fingerprinting for sharing of confidential data." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27275.
Full textVenkataraman, Aravind. "802.11 Fingerprinting to Detect Wireless Stealth Attacks." Digital Archive @ GSU, 2008. http://digitalarchive.gsu.edu/cs_theses/57.
Full textKennedy, Bobbie-Jo. "DNA fingerprinting of Native American skeletal remains." Virtual Press, 1995. http://liblink.bsu.edu/uhtbin/catkey/958779.
Full textDepartment of Anthropology
Meng, Anming. "DNA fingerprinting and minisatellite variation of swans." Thesis, University of Nottingham, 1990. http://eprints.nottingham.ac.uk/13889/.
Full textCarter, Royston Edwin. "Development adaptations & applications of DNA fingerprinting." Thesis, University of Nottingham, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.336944.
Full textPanoui, Anastasia. "Wide-sense fingerprinting codes and honeycomb arrays." Thesis, Royal Holloway, University of London, 2012. http://repository.royalholloway.ac.uk/items/0069d024-bc20-0d25-c1ab-ce87655766f0/8/.
Full textDeshmane, Anagha Vishwas. "Partial Volume Quantification Using Magnetic Resonance Fingerprinting." Case Western Reserve University School of Graduate Studies / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=case1491572611420032.
Full textBeecroft, Alexander J. "Passive fingerprinting of computer network reconnaissance tools." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FBeecroft.pdf.
Full textThesis Advisor(s): Michael, James B. "September 2009." Description based on title screen as viewed on November 04, 2009. Author(s) subject terms: Cyberspace defense, network defense, passive fingerprinting, computer network reconnaissance, network scanning, port scanning Includes bibliographical references (p. 67-69). Also available in print.
Lutz, Steven S. "Hokua – A Wavelet Method for Audio Fingerprinting." Diss., CLICK HERE for online access, 2009. http://contentdm.lib.byu.edu/ETD/image/etd3247.pdf.
Full textLi, Baoping. "Elemental and isotopic fingerprinting of Chinese archaeological ceramics /." [St. Lucia, Qld.], 2006. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe19207.pdf.
Full textGrönlund, Fredrik. "Positional Quality of Service using Dynamic Collection Fingerprinting." Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-66744.
Full textMeara, Rhian Hedd. "Geochemical fingerprinting of Icelandic silicic Holocene tephra layers." Thesis, University of Edinburgh, 2012. http://hdl.handle.net/1842/5834.
Full textDoherty, C. J. "Cystic fibrosis microbiology : molecular fingerprinting of microbial pathogens." Thesis, University of Edinburgh, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.649603.
Full textBorges, Pinto Lais Izabel. "Alu-polymerase chain reaction genomic fingerprinting in neuroblastoma." Thesis, University of Newcastle Upon Tyne, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.366679.
Full textIonescu, Dragos Ciprian. "VM and workload fingerprinting for software defined datacenters." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/85425.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 89-90).
In this work we develop strategies for mining telemetry streams in virtualized clusters to automatically discover relationships between sets of virtual machines. Examples of relationships include correlations between virtual machines, similarities in resource consumption patterns or dominant resources, and similarities in metric variations. The main challenge in our approach is to transform the raw captured data consisting of resource usage and VM-related metrics into a meaningful fingerprint that identifies the virtual machine and describes its performance. In our analysis we try to determine which of these metrics are relevant and how they can be expressed as a light-weight and robust fingerprint that offers insight about the status of the machine.
by Dragos Ciprian Ionescu.
M. Eng.