Transparent User Authentication Biometrics, RFID and Behavioural Profiling /
No existing user-authentication approaches provide universally strong user authentication, while also taking into account the human factors of good security design. A reevaluation is therefore vitally necessary to ensure user authentication is relevant, usable, secure and ubiquitous. This groundbrea...
| Main Author: | |
|---|---|
| Corporate Author: | |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
London :
Springer London,
2011.
|
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Part I: Enabling Security through User Authentication
- Current Use of User Authentication
- The Evolving Technological Landscape
- What is Really Being Achieved with User Authentication?- Part II: Authentication Approaches
- Intrusive Authentication Approaches
- Transparent Techniques
- Multibiometrics
- Biometric Standards
- Part III: System Design, Development and Implementation Considerations
- Theoretical Requirements of a Transparent Authentication System
- Implementation Considerations in Ubiquitous Networks
- Evolving Technology and the Future for Authentication.