Transparent User Authentication Biometrics, RFID and Behavioural Profiling /
No existing user-authentication approaches provide universally strong user authentication, while also taking into account the human factors of good security design. A reevaluation is therefore vitally necessary to ensure user authentication is relevant, usable, secure and ubiquitous. This groundbrea...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Autor Corporativo: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
London :
Springer London : Imprint: Springer,
2011.
|
Edición: | 1st ed. 2011. |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Part I: Enabling Security through User Authentication
- Current Use of User Authentication
- The Evolving Technological Landscape
- What is Really Being Achieved with User Authentication?- Part II: Authentication Approaches
- Intrusive Authentication Approaches
- Transparent Techniques
- Multibiometrics
- Biometric Standards
- Part III: System Design, Development and Implementation Considerations
- Theoretical Requirements of a Transparent Authentication System
- Implementation Considerations in Ubiquitous Networks
- Evolving Technology and the Future for Authentication.