Transparent User Authentication Biometrics, RFID and Behavioural Profiling /
No existing user-authentication approaches provide universally strong user authentication, while also taking into account the human factors of good security design. A reevaluation is therefore vitally necessary to ensure user authentication is relevant, usable, secure and ubiquitous. This groundbrea...
Κύριος συγγραφέας: | |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
London :
Springer London,
2011.
|
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Part I: Enabling Security through User Authentication
- Current Use of User Authentication
- The Evolving Technological Landscape
- What is Really Being Achieved with User Authentication?- Part II: Authentication Approaches
- Intrusive Authentication Approaches
- Transparent Techniques
- Multibiometrics
- Biometric Standards
- Part III: System Design, Development and Implementation Considerations
- Theoretical Requirements of a Transparent Authentication System
- Implementation Considerations in Ubiquitous Networks
- Evolving Technology and the Future for Authentication.