|
|
|
|
LEADER |
03263nam a22005415i 4500 |
001 |
978-3-319-58808-7 |
003 |
DE-He213 |
005 |
20170822164349.0 |
007 |
cr nn 008mamaa |
008 |
170822s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319588087
|9 978-3-319-58808-7
|
024 |
7 |
|
|a 10.1007/978-3-319-58808-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a GPF
|2 bicssc
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
082 |
0 |
4 |
|a 003.54
|2 23
|
100 |
1 |
|
|a Dasgupta, Dipankar.
|e author.
|
245 |
1 |
0 |
|a Advances in User Authentication
|h [electronic resource] /
|c by Dipankar Dasgupta, Arunava Roy, Abhijit Nag.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XIV, 360 p. 165 illus., 128 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Infosys Science Foundation Series,
|x 2363-6149
|
505 |
0 |
|
|a Authentication Basics -- Biometric Authentication -- Negative Authentication Systems -- Pseudo-Passwords and Non-Textual Approaches -- Multi-Factor Authentication -- Continuous Authentication -- Adaptive Multi-Factor Authentication.
|
520 |
|
|
|a This book is dedicated to advances in the field of user authentication. The book covers detailed description of the authentication process as well as types of authentication modalities along with their several features (authentication factors). It discusses the use of these modalities in a time-varying operating environment, including factors such as devices, media and surrounding conditions, like light, noise, etc. The book is divided into several parts that cover descriptions of several biometric and non-biometric authentication modalities, single factor and multi-factor authentication systems (mainly, adaptive), negative authentication system, etc. Adaptive strategy ensures the incorporation of the existing environmental conditions on the selection of authentication factors and provides significant diversity in the selection process. The contents of this book will prove useful to practitioners, researchers and students. The book is suited to be used a text in advanced/graduate courses on User Authentication Modalities. It can also be used as a textbook for professional development and certification coursework for practicing engineers and computer scientists. .
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Biometrics (Biology).
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Storage Representation.
|
650 |
2 |
4 |
|a Biometrics.
|
700 |
1 |
|
|a Roy, Arunava.
|e author.
|
700 |
1 |
|
|a Nag, Abhijit.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319588063
|
830 |
|
0 |
|a Infosys Science Foundation Series,
|x 2363-6149
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-58808-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|