Continuous Authentication Using Biometrics

Data, Models, and Metrics

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Continuous Authentication Using Biometrics by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466605619
Publisher: IGI Global Publication: September 30, 2011
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466605619
Publisher: IGI Global
Publication: September 30, 2011
Imprint: Information Science Reference
Language: English
User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat. Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the leading experts in this recent, fast growing research area. These chapters collectively provide a thorough and concise introduction to the field of biometric-based continuous authentication. The book covers the conceptual framework underlying continuous authentication and presents detailed processing models for various types of practical continuous authentication applications.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat. Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the leading experts in this recent, fast growing research area. These chapters collectively provide a thorough and concise introduction to the field of biometric-based continuous authentication. The book covers the conceptual framework underlying continuous authentication and presents detailed processing models for various types of practical continuous authentication applications.

More books from IGI Global

Cover of the book Virtual Traumascapes and Exploring the Roots of Dark Tourism by
Cover of the book Biologically-Inspired Techniques for Knowledge Discovery and Data Mining by
Cover of the book Systemic Knowledge-Based Assessment of Higher Education Programs by
Cover of the book Nuclear Power Plant Instrumentation and Control Systems for Safety and Security by
Cover of the book Analyzing the Role of Citizen Science in Modern Research by
Cover of the book Marketing Online Education Programs by
Cover of the book Tablets in K-12 Education by
Cover of the book Cases on Teaching Critical Thinking through Visual Representation Strategies by
Cover of the book Wearable Technologies by
Cover of the book Handbook of Research on Applied Learning Theory and Design in Modern Education by
Cover of the book E-Business Managerial Aspects, Solutions and Case Studies by
Cover of the book Improving Knowledge Discovery through the Integration of Data Mining Techniques by
Cover of the book Creativity in Load-Balance Schemes for Multi/Many-Core Heterogeneous Graph Computing by
Cover of the book Knowledge Management Innovations for Interdisciplinary Education by
Cover of the book Big Data Analytics in Bioinformatics and Healthcare by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy