Continuous Authentication Using Biometrics

Data, Models, and Metrics

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Continuous Authentication Using Biometrics by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466605619
Publisher: IGI Global Publication: September 30, 2011
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466605619
Publisher: IGI Global
Publication: September 30, 2011
Imprint: Information Science Reference
Language: English
User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat. Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the leading experts in this recent, fast growing research area. These chapters collectively provide a thorough and concise introduction to the field of biometric-based continuous authentication. The book covers the conceptual framework underlying continuous authentication and presents detailed processing models for various types of practical continuous authentication applications.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat. Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the leading experts in this recent, fast growing research area. These chapters collectively provide a thorough and concise introduction to the field of biometric-based continuous authentication. The book covers the conceptual framework underlying continuous authentication and presents detailed processing models for various types of practical continuous authentication applications.

More books from IGI Global

Cover of the book Handbook of Research on Competency-Based Education in University Settings by
Cover of the book Digital Currency by
Cover of the book Mobile Services Industries, Technologies, and Applications in the Global Economy by
Cover of the book Handbook of Research on Emergent Applications of Optimization Algorithms by
Cover of the book Virtual Learning Environments by
Cover of the book Activity Theory Perspectives on Technology in Higher Education by
Cover of the book Technology as a Tool for Diversity Leadership by
Cover of the book Optimizing Human-Computer Interaction With Emerging Technologies by
Cover of the book Community Engagement Program Implementation and Teacher Preparation for 21st Century Education by
Cover of the book Quantitative Semantics and Soft Computing Methods for the Web by
Cover of the book The Belt and Road Strategy in International Business and Administration by
Cover of the book Psychological, Social, and Cultural Aspects of Internet Addiction by
Cover of the book Academic Podcasting and Mobile Assisted Language Learning by
Cover of the book E-Discovery Tools and Applications in Modern Libraries by
Cover of the book Handbook of Research on the Evolution of IT and the Rise of E-Society by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy