๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Iris biometric model for secured network access

โœ Scribed by Franjieh El Khoury


Publisher
CRC Press
Year
2013
Tongue
English
Leaves
215
Series
ENGnetBASE
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


"The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one hand the transition from a centralized to a decentralized system distributed locally or remotely, has facilitated the Read more...

โœฆ Table of Contents



Content: Pt. 1. State of the art --
pt. 2. Critical analysis of methods of iris recognition --
pt. 3. Our proposed model: the iris crypto agent system --
pt. 4. Implementation and simulations.
Abstract: "The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one hand the transition from a centralized to a decentralized system distributed locally or remotely, has facilitated the tasks in various sectors (i.e., educational, social, government, commercial, etc.). On the other hand, the integration of the Internet has encouraged communication at international level, and allowed operations remotely (i.e., e-commerce, e-banking, etc.). Besides the Internet, there is the mobile network that provides advanced services (i.e., multimedia messaging, Internet access, etc.)"


๐Ÿ“œ SIMILAR VOLUMES


Biometrics for Network Security
โœ Paul Reid ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Prentice Hall PTR ๐ŸŒ English

Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate. Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evol

Biometrics for Network Security
โœ Paul Reid ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Prentice Hall PTR ๐ŸŒ English

The biggest vulnerability in most enterprise networks is the authenticationsystem--especially if it relies solely on passwords. And a result, many companiesare looking to combine password authentication with other authenticationmethods, most especially biometrics. The few biometrics books that do ex

Risk Propagation Assessment for Network
โœ Mohamed Slim Ben Mahmoud, Nicolas Larrieu, Alain Pirovano(auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Wiley-ISTE ๐ŸŒ English

<p>The focus of this book is risk assessment methodologies for network architecture design. The main goal is to present and illustrate an innovative risk propagation-based quantitative assessment tool. This original approach aims to help network designers and security administrators to design and bu

Hidden Biometrics: When Biometric Securi
โœ Amine Nait-ali ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› Springer Singapore ๐ŸŒ English

<p><p></p><p>This book explores intrinsic and human body part biometrics and biometrics of human physiological activities, invisible to the naked eye. This includes, for instance, brain structures, skeleton morphology, heart activity, etc. These human body parts can only be visualized using specific