Rozprawy doktorskie na temat „Fingerprinting”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Fingerprinting”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Strobel, Cornelia. "Fuzzy Fingerprinting". Universitätsbibliothek Chemnitz, 2005. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200500106.
Pełny tekst źródłaFingerabdrücke besitzen sowohl in der Kryptographie als auch in der Biometrie eine große Bedeutung. In kryptographischen Anwendungen werden diese durch Einweg-Hash-Verfahren erzeugt, die für bestimmte Anwendungen auch kollisionsresitent sein müssen. In der Praxis schenken Benutzer diesen Fingerprints weit weniger Aufmerksamkeit - oft genügt es nur hinreichend ähnliche Fingerprints auszugeben, um die Nutzer zu täuschen Die Kriterien, die dabei erfüllt sein müssen und die Erzeugung dieser "Fuzzy Fingerprints" sind Hauptbestandteil dieses Vortrags. Durch die Demonstration eines Tools im praktischen Einsatz wird dieser abgeschlossen
Kristoffer, Frisell. "FINGERPRINTING AV HÅRDVARULIKA ENHETER : Precisionsmätning med fingerprinting på mobila enheter". Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-10052.
Pełny tekst źródłaEllch, Jonathan P. "Fingerprinting 802.11 devices". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FEllch.pdf.
Pełny tekst źródłaThesis Advisor(s): Dennis Volpano and Chris Eagle. "September 2006." Includes bibliographical references (p. 67). Also available in print.
Kim, Joonsoo. "Reliable SRAM Fingerprinting". Thesis, The University of Texas at Austin, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3572874.
Pełny tekst źródłaDevice identification, as human identification has been, has become critical to mitigate growing security problems. In the era of ubiquitous computing, it is important to ensure universal device identities that are versatile in number of ways, for example, to enhance computer security or to enable large-scale data capture, management and analysis. For device identities, simple labeling works only if they are properly managed under a highly controlled environment. We can also impose hard-coded serial numbers into non-volatile memories but it is well known that this is expensive and vulnerable to security attacks. Hence, it is desirable to develop reliable and secure device identification methods using fingerprint-like characteristics of the electronic devices.
As technology scales, process variation has become the most critical barrier to overcome for modern chip development. Ironically, there are some research works to exploit the aggressive process variation for the identification of individual devices. They find measurable physical characteristics that are unique to each integrated circuit. Among them, device identification using initial power-up values of SRAM cells, called SRAM fingerprints, has been emphasized lately in part due to the abundant availability of SRAM cells in modern microprocessors. More importantly, since the cross-coupled inverter structure of each SRAM cell amplifies even the small mismatches between two inverter nodes, it is thus very sensitive to and maximizes the effect of random process variation, making SRAM fingerprints to acquire great features as a naturally inherent device ID.
Therefore, this work focuses on achieving reliable device identification using SRAM fingerprints. As of date, this dissertation shows the most comprehensive feature characterization of SRAM fingerprints based on the large datasets measured from the real devices under various environmental conditions. SRAM fingerprints in three different process technologies—IBM 32nm SOI technology, IBM 65nm bulk technology, and TSMC 90nm low-k dielectric technology—have been investigated across different temperatures or voltages. By using formal statistical tools, the required features for SRAM fingerprints necessary to be usable as device IDs—uniqueness, randomness, independence, reproducibility, etc.—have been empirically proven.
As some of the previous works mentioned, there is an inherent unreliability of the initial states of SRAM cells so that there is always some chance of errors during identification process. It is observed that, under environmental variations, the instability aggravates even more. Most of the previous work, however, ignores the temperature dependence of the SRAM power-up values, which turns out to be critical against our past speculations and becomes a real challenge in realizing a reliable SRAM-based device identification. Note that temperature variation will not be negligible in many situations, for example, authentication of widely distributed sensors.
We show that it is possible to achieve SRAM-based device identification system that reliably operates under a wide range of temperatures. The proposed system is composed of three major steps: enrollment, system evaluation, and matching. During the enrollment process, power-up samples of SRAM fingerprints are captured from each manufactured device and the feature information or characterization identifier (CID) is characterized to generate a representative fingerprint value associated with the product device. By collecting the samples and the CIDs, system database gets constructed before distributing devices to the field. During the matching process, we take a single sample fingerprint of a power-cycle experiment, the field identifier (FID), and perform a match against a repository of CID’s of all manufactured devices. There is an additional monitoring subsystem, called system evaluation, that estimates the system accuracy with the system database. It controls the system parameters while maintaining the system accuracy requirement.
This work delivers a total-package statistical framework that raises design issues of each step and provides systematic solutions to deal with these inter-related issues. We provide statistical methods to determine sample size for the enrollment of chip identities, to generate the representative fingerprint features with the limited number of test samples, and to estimate the system performance along with the proposed system parameter values and the confidence interval of the estimation. A novel matching scheme is proposed to improve the system accuracy and increase population coverage under environmental variations, especially temperature variation. Several advanced mechanisms to exploit the instability for our benefit is also discussed along with supporting state-of-the-art circuit technologies. All these pioneering theoretical frameworks have been validated by the comprehensive empirical analysis based on the real SRAM fingerprint datasets introduced earlier.
The main contribution here is that this work provides a comprehensive interdisciplinary framework to enable reliable SRAM fingerprinting, even if the fingerprint, depending on ambient conditions, exhibits nondeterministic behaviors. Furthermore, the interdisciplinary bases introduced in our work are expected to provide generic fundamental methodologies that apply to device fingerprints in general, not just to SRAM fingerprints. (Abstract shortened by UMI.)
MA, DAN. "Magnetic Resonance Fingerprinting". Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1426170542.
Pełny tekst źródłaLiu, Hui Qing 1957. "Fingerprinting biological materials". Thesis, The University of Arizona, 1992. http://hdl.handle.net/10150/291369.
Pełny tekst źródłaKarlsson, Anna. "Device Sensor Fingerprinting : Mobile Device Sensor Fingerprinting With A Biometric Approach". Thesis, Linköpings universitet, Informationskodning, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119341.
Pełny tekst źródłaLöfvenberg, Jacob. "Codes for digital fingerprinting /". Linköping : Univ, 2001. http://www.bibl.liu.se/liupubl/disp/disp2001/tek722s.pdf.
Pełny tekst źródłaLindkvist, Tina. "Fingerprinting of digital documents /". Linköping : Univ, 2001. http://www.bibl.liu.se/liupubl/disp/disp2001/tek706s.pdf.
Pełny tekst źródłaPorter, Alastair. "Evaluating musical fingerprinting systems". Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=117191.
Pełny tekst źródłaLe système d'empreinte audio est un procédé qui analyse de courts extraits de musique avec un ordinateur pour répondre à une question courante: « Quelle est le nom de cette chanson que j'écoute? ». Les systèmes d'empreintes audio identifient le contenu musical d'un enregistrement et cherchent des documents sonores possédant les même traits musicaux au sein d'une base de données de référence. Ces systèmes sont capables de fonctionner même si les requêtes qui leur sont transmises sont enregistrées dans un espace public, avec de nombreuses sources de bruit extérieur. Les différents algorithmes d'empreinte audio se distinguent par le type de requête qu'ils peuvent traiter: certains se concentrent sur des requêtes de courte durée, d'autres sont optimisés pour pouvoir être performant même dans des conditions de bruit très défavorables. Dans la littérature, il existe peu d'études comparatives poussées traitant spécifiquement des performances des systèmes de reconnaissance par empreinte audio dans un large éventail de cas.Cette thèse présente une vue d'ensemble de l'histoire du développement des systèmes d'empreinte audio. Cette thèse introduit en suite des facteurs qui doivent être pris en compte lors de l'évaluation comparative de plusieurs algorithmes pour la reconnaissance par empreinte audio. De plus, ce travail présente un nouveau cadre d'évaluation développé afin d'incorporer ces facteurs. Cette thèse combine les résultats d'une comparaison à grande échelle de trois algorithmes d'identification d'empreinte audio avec une analyse recommandant lequel de ces algorithmes est le plus efficace pour identifier la plus grande variété d'extraits audio.
Berg, Alfred, i Norton Lamberg. "Automatic fingerprinting of websites". Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-278052.
Pełny tekst źródłaSammanfattningAtt ta fingeravtryck av en hemsida innebär att identifiera vilka teknologier som enhemsida använder, såsom dess webbapplikationer och JavaScript-ramverk.Nuvarande metoder för att göra fingeravtryckningar av hemsidor använder sig avmanuellt skapade fingeravtryck för varje teknologi som de letar efter. Dessafingeravtryck består av flera textsträngar som matchas mot HTTP-svar frånhemsidor. Att skapa fingeravtryck kan vara en tidskrävande process vilketbegränsar vilka teknologier som fingeravtryck kan skapas för. Den här rapportenpresenterar en potentiell lösning genom att utnyttja oövervakademaskininlärningstekniker för att klustra hemsidor efter vilka webbapplikationeroch JavaScript-ramverk som används, utan att manuellt skapa fingeravtryck. Dettauppnås genom att använda flera ordvektormodeller tillsammans meddimensionalitetreducerings-tekniken t-SNE och klustringsalgoritmen OPTICS.Resultatet visar att vissa teknologier, till exempel Drupal, får en precision på 0,731och en recall på 0,485 utan någon träningsdata. Detta leder till slutsatsen att denföreslagna lösningen möjligtvis kan användas för att klustra hemsidor efter dewebbapplikationer och JavaScript-ramverk som används. Men mera arbete behövsför att öka precision och recall av resultaten.NyckelordKlustring, fingeravtryckning, OPTICS, t-SNE, huvudlös webbläsare, ordvektor,oövervakad maskininlärnin g
Izadinia, Vafa Dario. "Fingerprinting Encrypted Tunnel Endpoints". Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/25351.
Pełny tekst źródłaDissertation (MSc (Computer Science))--University of Pretoria, 2005.
Computer Science
unrestricted
Strömbom, Johannes. "Natural Fingerprinting of Steel". Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85531.
Pełny tekst źródłaHöglund, Salomon. "Informing Users About Fingerprinting". Thesis, Södertörns högskola, Medieteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-38592.
Pełny tekst źródłaSjälvständigt Examensarbete (Forskningsartikel)
Toonstra, Jason Paul. "A radio transmitter fingerprinting system". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp04/mq23529.pdf.
Pełny tekst źródłaRadhakrishnan, Sakthi Vignesh. "A framework for system fingerprinting". Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47609.
Pełny tekst źródłaRoring, Solvig Mary Margaret. "DNA fingerprinting of Mycobacterium bovis". Thesis, Queen's University Belfast, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.287426.
Pełny tekst źródłaLuangmaneerote, Sakchan. "Defences against browser fingerprinting techniques". Thesis, University of Southampton, 2018. https://eprints.soton.ac.uk/427361/.
Pełny tekst źródłaMohamed, Azmin Nor Fadhillah. "Fingerprinting of complex bioprocess data". Thesis, University of Newcastle upon Tyne, 2013. http://hdl.handle.net/10443/2079.
Pełny tekst źródłaAndrews, Seth Dixon. "Extensions to Radio Frequency Fingerprinting". Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/95952.
Pełny tekst źródłaDoctor of Philosophy
Radio frequency fingerprinting allows uniquely identifying a transmitter based on characteristics of the signal it emits. In this dissertation several extensions to current fingerprinting techniques are given. Together, these allow identification of transmitters which have changed the signal sent, identifying using different measurement types, and compensating for variation in a transmitter's behavior due to changes in temperature.
King, Joseph. "Analysis and Fingerprinting of Glycosaminoglycans". VCU Scholars Compass, 2011. http://scholarscompass.vcu.edu/etd/2524.
Pełny tekst źródłaBolin, Tobias. "Device fingerprinting: Conformance test av HTML5". Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-11024.
Pełny tekst źródłaSalter, James William Computer Science & Engineering Faculty of Engineering UNSW. "802.11 positioning using signal strength fingerprinting". Publisher:University of New South Wales. Computer Science & Engineering, 2008. http://handle.unsw.edu.au/1959.4/43353.
Pełny tekst źródłaLee, Kung-Chung. "Localization systems using signal strength fingerprinting". Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/28750.
Pełny tekst źródłaRochanakul, Penying. "Fingerprinting codes and separating hash families". Thesis, Royal Holloway, University of London, 2013. http://repository.royalholloway.ac.uk/items/464834d6-82c2-e1d2-e15f-92cf228d9704/7/.
Pełny tekst źródłaDonaldson, John P. "Source fingerprinting in adobe PDF files". Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/38919.
Pełny tekst źródłaAdobe Portable Document Format (PDF) documents are increasingly used as a vector for targeted attacks. Although there exist a number of tools and methodologies for performing content-level analysis to identify unwanted or malicious behavior or characteristics in these documents, these forms of analysis are hampered by increasingly complex obfuscation techniques and usually require execution of potentially malicious code. This thesis proposes a static analysis method that uses structural elements of PDF documents to identify the tools used to generate them. This method may be used to attribute malicious PDFs to particular toolkits.
Zhu, Jiahui. "DNA fingerprinting in Oryza sativa L". Thesis, University of East Anglia, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338095.
Pełny tekst źródłaKara, Danielle Christine. "Understanding Error in Magnetic Resonance Fingerprinting". Case Western Reserve University School of Graduate Studies / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=case1521406087127691.
Pełny tekst źródłaAndriamilanto, Tompoariniaina Nampoina. "Leveraging browser fingerprinting for web authentication". Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S045.
Pełny tekst źródłaWeb authentication is the verification that a visitor claiming an account legitimately owns this account. Several authentication factors were proposed such that each one provides a supplementary security barrier. Browser fingerprints notably came out as a promising candidate. They are the aggregation of properties collected from a web browser, which compose a potentially unique fingerprint. In this thesis, we provide two contributions. We investigate the adequacy of browser fingerprints for web authentication. We make the link between the digital fingerprints that distinguish browsers, and the biological fingerprints that distinguish Humans, to evaluate browser fingerprints according to properties inspired by biometric authentication factors. We assess these properties on four real-life browser fingerprint datasets, which include one of nearly two million browsers. We propose FPSelect, an attribute selection framework to find the attribute set that satisfies a security requirement and reduces the usability cost. The security is measured as the proportion of impersonated users given a fingerprinting probe, a user population, and a modeled attacker. The usability is quantified by the collection time of browser fingerprints, their size, and their instability. We compare our framework with common baselines using on two real-life fingerprint datasets
Reyes, Omar Costilla. "Dynamic WIFI Fingerprinting Indoor Positioning System". Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699843/.
Pełny tekst źródłaMorgan, Matthew Philip. "Immune fingerprinting in acute severe sepsis". Thesis, Cardiff University, 2014. http://orca.cf.ac.uk/70408/.
Pełny tekst źródłaDerksen, Linda Anne. "Agency and structure in the history of DNA profiling : the stabilization and standardization of a new technology /". Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC IP addresses, 2003. http://wwwlib.umi.com/cr/ucsd/fullcit?p3083460.
Pełny tekst źródłaKaltenbach, Hans-Michael. "Statistics and algorithms for peptide mass fingerprinting". [S.l.] : [s.n.], 2007. http://deposit.ddb.de/cgi-bin/dokserv?idn=983903395.
Pełny tekst źródłaZhao, Hong. "Multimedia fingerprinting for multiuser forensics and security". College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/2068.
Pełny tekst źródłaThesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Hou, Shuhui. "Anti-Collusion Fingerprinting for Multimedia Content Protection". 京都大学 (Kyoto University), 2009. http://hdl.handle.net/2433/123841.
Pełny tekst źródłaMucsi-Nagy, Agnes. "Digital fingerprinting for sharing of confidential data". Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27275.
Pełny tekst źródłaVenkataraman, Aravind. "802.11 Fingerprinting to Detect Wireless Stealth Attacks". Digital Archive @ GSU, 2008. http://digitalarchive.gsu.edu/cs_theses/57.
Pełny tekst źródłaKennedy, Bobbie-Jo. "DNA fingerprinting of Native American skeletal remains". Virtual Press, 1995. http://liblink.bsu.edu/uhtbin/catkey/958779.
Pełny tekst źródłaDepartment of Anthropology
Meng, Anming. "DNA fingerprinting and minisatellite variation of swans". Thesis, University of Nottingham, 1990. http://eprints.nottingham.ac.uk/13889/.
Pełny tekst źródłaCarter, Royston Edwin. "Development adaptations & applications of DNA fingerprinting". Thesis, University of Nottingham, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.336944.
Pełny tekst źródłaPanoui, Anastasia. "Wide-sense fingerprinting codes and honeycomb arrays". Thesis, Royal Holloway, University of London, 2012. http://repository.royalholloway.ac.uk/items/0069d024-bc20-0d25-c1ab-ce87655766f0/8/.
Pełny tekst źródłaDeshmane, Anagha Vishwas. "Partial Volume Quantification Using Magnetic Resonance Fingerprinting". Case Western Reserve University School of Graduate Studies / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=case1491572611420032.
Pełny tekst źródłaBeecroft, Alexander J. "Passive fingerprinting of computer network reconnaissance tools". Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FBeecroft.pdf.
Pełny tekst źródłaThesis Advisor(s): Michael, James B. "September 2009." Description based on title screen as viewed on November 04, 2009. Author(s) subject terms: Cyberspace defense, network defense, passive fingerprinting, computer network reconnaissance, network scanning, port scanning Includes bibliographical references (p. 67-69). Also available in print.
Lutz, Steven S. "Hokua – A Wavelet Method for Audio Fingerprinting". Diss., CLICK HERE for online access, 2009. http://contentdm.lib.byu.edu/ETD/image/etd3247.pdf.
Pełny tekst źródłaLi, Baoping. "Elemental and isotopic fingerprinting of Chinese archaeological ceramics /". [St. Lucia, Qld.], 2006. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe19207.pdf.
Pełny tekst źródłaGrönlund, Fredrik. "Positional Quality of Service using Dynamic Collection Fingerprinting". Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-66744.
Pełny tekst źródłaMeara, Rhian Hedd. "Geochemical fingerprinting of Icelandic silicic Holocene tephra layers". Thesis, University of Edinburgh, 2012. http://hdl.handle.net/1842/5834.
Pełny tekst źródłaDoherty, C. J. "Cystic fibrosis microbiology : molecular fingerprinting of microbial pathogens". Thesis, University of Edinburgh, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.649603.
Pełny tekst źródłaBorges, Pinto Lais Izabel. "Alu-polymerase chain reaction genomic fingerprinting in neuroblastoma". Thesis, University of Newcastle Upon Tyne, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.366679.
Pełny tekst źródłaIonescu, Dragos Ciprian. "VM and workload fingerprinting for software defined datacenters". Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/85425.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (pages 89-90).
In this work we develop strategies for mining telemetry streams in virtualized clusters to automatically discover relationships between sets of virtual machines. Examples of relationships include correlations between virtual machines, similarities in resource consumption patterns or dominant resources, and similarities in metric variations. The main challenge in our approach is to transform the raw captured data consisting of resource usage and VM-related metrics into a meaningful fingerprint that identifies the virtual machine and describes its performance. In our analysis we try to determine which of these metrics are relevant and how they can be expressed as a light-weight and robust fingerprint that offers insight about the status of the machine.
by Dragos Ciprian Ionescu.
M. Eng.