Cargando…

Iris biometric model for secured network access /

"The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: El Khoury, Franjieh
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : CRC Press, ©2013.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn841809646
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 130506s2013 flu ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d CUS  |d E7B  |d VLB  |d IDEBK  |d CDX  |d COO  |d OTZ  |d WAU  |d BWS  |d OCLCO  |d B24X7  |d OCLCF  |d CRCPR  |d OCLCQ  |d YDXCP  |d DEBSZ  |d UMI  |d VT2  |d OCLCQ  |d Z5A  |d MOR  |d PIFBY  |d LIV  |d OCLCQ  |d UAB  |d OCLCQ  |d OCLCA  |d OCLCQ  |d CEF  |d U3W  |d NLE  |d OCLCQ  |d UKMGB  |d S9I  |d YDX  |d TYFRS  |d OCLCQ  |d UKAHL  |d OCLCQ  |d EYM  |d OCLCQ  |d OCLCO  |d OCLCQ  |d SFB  |d OCLCQ  |d OCLCO  |d OCLCL 
015 |a GBB7C5587  |2 bnb 
016 7 |a 018424349  |2 Uk 
019 |a 859349344  |a 859409103  |a 988500047  |a 991898226  |a 994901197  |a 994983463  |a 1008942635  |a 1021257779  |a 1202537752  |a 1228575821  |a 1240507412 
020 |a 9781466502147  |q (electronic bk.) 
020 |a 1466502142  |q (electronic bk.) 
020 |a 9781299710368  |q (MyiLibrary) 
020 |a 1299710360  |q (MyiLibrary) 
020 |z 9781466502130 
020 |z 1466502134 
020 |z 9781138198722 
024 7 |a 10.1201/b14817  |2 doi 
029 1 |a AU@  |b 000052162513 
029 1 |a AU@  |b 000053295751 
029 1 |a DEBBG  |b BV041432953 
029 1 |a DEBSZ  |b 398289050 
029 1 |a DEBSZ  |b 431397708 
029 1 |a NZ1  |b 14939074 
029 1 |a UKMGB  |b 018424349 
035 |a (OCoLC)841809646  |z (OCoLC)859349344  |z (OCoLC)859409103  |z (OCoLC)988500047  |z (OCoLC)991898226  |z (OCoLC)994901197  |z (OCoLC)994983463  |z (OCoLC)1008942635  |z (OCoLC)1021257779  |z (OCoLC)1202537752  |z (OCoLC)1228575821  |z (OCoLC)1240507412 
037 |a CL0500000313  |b Safari Books Online 
050 4 |a TK7882.B56  |b K46 2013eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
084 |a COM053000  |a COM083000  |a TEC015000  |2 bisacsh 
049 |a UAMI 
100 1 |a El Khoury, Franjieh. 
245 1 0 |a Iris biometric model for secured network access /  |c Franjieh El Khoury. 
260 |a Boca Raton :  |b CRC Press,  |c ©2013. 
300 |a 1 online resource (xvii, 204 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
520 |a "The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one hand the transition from a centralized to a decentralized system distributed locally or remotely, has facilitated the tasks in various sectors (i.e., educational, social, government, commercial, etc.). On the other hand, the integration of the Internet has encouraged communication at international level, and allowed operations remotely (i.e., e-commerce, e-banking, etc.). Besides the Internet, there is the mobile network that provides advanced services (i.e., multimedia messaging, Internet access, etc.)"--  |c Provided by publisher 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a pt. 1. State of the art -- pt. 2. Critical analysis of methods of iris recognition -- pt. 3. Our proposed model : the iris crypto agent system -- pt. 4. Implementation and simulations. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Biometric identification. 
650 0 |a Iris (Eye) 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Identification biométrique. 
650 6 |a Iris (Anatomie) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Cryptography.  |2 bisacsh 
650 7 |a TECHNOLOGY & ENGINEERING  |x Imaging Systems.  |2 bisacsh 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a Biometric identification  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Iris (Eye)  |2 fast 
758 |i has work:  |a Iris biometric model for secured network access (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGh3JbFkHJ9b4BR6pTg4VP  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Khoury, Franjieh El.  |t Iris biometric model for secured network access.  |d Boca Raton : CRC Press, 2013  |z 9781466502130  |w (DLC) 2012051055  |w (OCoLC)748331600 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781466502147/?ar  |z Texto completo 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1177222  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH41913958 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24920093 
938 |a Books 24x7  |b B247  |n bks00051955 
938 |a Coutts Information Services  |b COUT  |n 25778349 
938 |a ebrary  |b EBRY  |n ebr10691559 
938 |a EBSCOhost  |b EBSC  |n 573088 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis25778349 
938 |a Taylor & Francis  |b TAFR  |n CRC0KE15877PDF 
938 |a Taylor & Francis  |b TAFR  |n 9780429067198 
938 |a YBP Library Services  |b YANK  |n 15915122 
938 |a YBP Library Services  |b YANK  |n 10393215 
938 |a YBP Library Services  |b YANK  |n 10714886 
994 |a 92  |b IZTAP