9781613501290-1613501293-Continuous Authentication Using Biometrics: Data, Models, and Metrics

Continuous Authentication Using Biometrics: Data, Models, and Metrics

ISBN-13: 9781613501290
ISBN-10: 1613501293
Edition: 1
Author: Issa Traoré, Ahmed Awad E Ahmed
Publication date: 2011
Publisher: Information Science Reference
Format: Hardcover 296 pages
FREE US shipping
Buy

From $195.00

Book details

ISBN-13: 9781613501290
ISBN-10: 1613501293
Edition: 1
Author: Issa Traoré, Ahmed Awad E Ahmed
Publication date: 2011
Publisher: Information Science Reference
Format: Hardcover 296 pages

Summary

Continuous Authentication Using Biometrics: Data, Models, and Metrics (ISBN-13: 9781613501290 and ISBN-10: 1613501293), written by authors Issa Traoré, Ahmed Awad E Ahmed, was published by Information Science Reference in 2011. With an overall rating of 4.1 stars, it's a notable title among other Computer Science books. You can easily purchase or rent Continuous Authentication Using Biometrics: Data, Models, and Metrics (Hardcover) from BooksRun, along with many other new and used Computer Science books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat.

Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the leading experts in this recent, fast growing research area. These chapters collectively provide a thorough and concise introduction to the field of biometric-based continuous authentication. The book covers the conceptual framework underlying continuous authentication and presents detailed processing models for various types of practical continuous authentication applications.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book