Transparent User Authentication Biometrics, RFID and Behavioural Profiling /
No existing user-authentication approaches provide universally strong user authentication, while also taking into account the human factors of good security design. A reevaluation is therefore vitally necessary to ensure user authentication is relevant, usable, secure and ubiquitous. This groundbrea...
Main Author: | |
---|---|
Corporate Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
London :
Springer London,
2011.
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Part I: Enabling Security through User Authentication
- Current Use of User Authentication
- The Evolving Technological Landscape
- What is Really Being Achieved with User Authentication?- Part II: Authentication Approaches
- Intrusive Authentication Approaches
- Transparent Techniques
- Multibiometrics
- Biometric Standards
- Part III: System Design, Development and Implementation Considerations
- Theoretical Requirements of a Transparent Authentication System
- Implementation Considerations in Ubiquitous Networks
- Evolving Technology and the Future for Authentication.