|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_ocn905862066 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
150218t20152015enka ob 000 0 eng d |
040 |
|
|
|a E7B
|b eng
|e rda
|e pn
|c E7B
|d OCLCO
|d BTCTA
|d N$T
|d IDEBK
|d OCLCF
|d YDXCP
|d EBLCP
|d DEBSZ
|d RRP
|d OCL
|d IDB
|d OCLCQ
|d AGLDB
|d MOR
|d PIFAG
|d VGM
|d ZCU
|d OCLCQ
|d MERUC
|d OCLCQ
|d U3W
|d D6H
|d STF
|d VTS
|d CEF
|d ICG
|d NLE
|d INT
|d VT2
|d UKMGB
|d OCLCQ
|d WYU
|d TKN
|d OCLCQ
|d DKC
|d OCLCQ
|d UKAHL
|d OCLCQ
|d AJS
|d ELBRO
|d OCLCO
|d QGK
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB6I0069
|2 bnb
|
016 |
7 |
|
|a 017859927
|2 Uk
|
019 |
|
|
|a 903318581
|a 922952277
|a 927460787
|a 1055364537
|a 1066606525
|a 1081193992
|a 1228606459
|a 1259203010
|
020 |
|
|
|a 9781443874991
|q (electronic bk.)
|
020 |
|
|
|a 144387499X
|q (electronic bk.)
|
020 |
|
|
|a 1322889546
|q (ebk)
|
020 |
|
|
|a 9781322889542
|q (ebk)
|
020 |
|
|
|a 1443871834
|
020 |
|
|
|a 9781443871839
|
020 |
|
|
|z 9781443871839
|
029 |
1 |
|
|a AU@
|b 000056079423
|
029 |
1 |
|
|a AU@
|b 000066119158
|
029 |
1 |
|
|a DEBBG
|b BV043620970
|
029 |
1 |
|
|a DEBBG
|b BV044074425
|
029 |
1 |
|
|a DEBSZ
|b 442841655
|
029 |
1 |
|
|a DEBSZ
|b 475038614
|
029 |
1 |
|
|a DEBSZ
|b 493161058
|
029 |
1 |
|
|a UKMGB
|b 017859927
|
035 |
|
|
|a (OCoLC)905862066
|z (OCoLC)903318581
|z (OCoLC)922952277
|z (OCoLC)927460787
|z (OCoLC)1055364537
|z (OCoLC)1066606525
|z (OCoLC)1081193992
|z (OCoLC)1228606459
|z (OCoLC)1259203010
|
037 |
|
|
|a 720236
|b MIL
|
050 |
|
4 |
|a TK7882.B56
|b .B566 2015eb
|
072 |
|
7 |
|a NAT
|x 027000
|2 bisacsh
|
072 |
|
7 |
|a SCI
|x 008000
|2 bisacsh
|
072 |
|
7 |
|a SCI
|x 086000
|2 bisacsh
|
082 |
0 |
4 |
|a 570.15195
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Biometric security /
|c edited by David Chek Ling Ngo, Andrew Beng Jin Teoh and Jiankun Hu.
|
264 |
|
1 |
|a Newcastle upon Tyne, England :
|b Cambridge Scholars Publishing,
|c 2015.
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (495 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references at the end of each chapters.
|
588 |
0 |
|
|a Online resource; title from PDF title page (ebrary, viewed February 18, 2015).
|
505 |
0 |
|
|a pt. 1 Biometric Template Protection -- ch. One Cancelable Biometrics and Data Separation Schemes / Kenta Takahashi -- ch. Two Minutiae-based Fingerprint Representations: Review, Privacy, Security and Cryptographic Realization / Bok-Min Goi -- ch. Three Palmprint Template Protection Technologies / Lu Leng -- pt. 2 Biometric Key and Encryption -- ch. Four Biometric Discretization for Template Protection and Cryptographic Key Generation / Meng-Hui Lim -- ch. Five De-Identifying Biometric Images by Decomposition and Mixing / Arun Ross -- pt. 3 Biometric System Analysis -- ch. Six BioPACE: Biometric-Protected Authentication Connection Establishment / Christoph Busch -- ch. Seven Privacy and Security Assessment of Biometric Systems / Christophe Rosenberger -- ch. Eight A Generalized Framework for Privacy and Security Assessment of Biometric Template Protection / Bian Yang -- pt. 4 Privacy-Enhanced Biometric Systems.
|
505 |
8 |
|
|a Ch. Nine Secure and Efficient Iris and Fingerprint Identification / Paolo Gasti -- ch. Ten Identification Over Outsourced Biometric Data / Alain Patey -- ch. Eleven A Collaborative Framework Design for Distributed Biometrics-based Authentication in the Cloud / Myung Ho Kim -- ch. Twelve Secure Two-Party Computation and Biometric Identification / Alain Patey -- pt. 5 Other Biometric Security Technologies -- ch. Thirteen Watermarked Biometrics / Mohammed Ahmad A. Alkhathami.
|
520 |
|
|
|a Modern biometrics delivers an enhanced level of security by means of a ""proof of property"". The design and deployment of a biometric system, however, hide many pitfalls, which, when underestimated, can lead to major security weaknesses and privacy threats. Issues of concern include biometric identity theft and privacy invasion because of the strong connection between a user and his identity. This book showcases a collection of comprehensive references on the advances of biometric security technology. It compiles a total of fourteen articles, all contributed by thirty-two eminent researchers
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Biometric identification.
|
650 |
|
0 |
|a Security systems.
|
650 |
|
6 |
|a Identification biométrique.
|
650 |
|
6 |
|a Systèmes de sécurité.
|
650 |
|
7 |
|a security systems.
|2 aat
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Privacy & data protection.
|2 bicssc
|
650 |
|
7 |
|a Computer fraud & hacking.
|2 bicssc
|
650 |
|
7 |
|a NATURE
|x Reference.
|2 bisacsh
|
650 |
|
7 |
|a SCIENCE
|x Life Sciences
|x Biology.
|2 bisacsh
|
650 |
|
7 |
|a SCIENCE
|x Life Sciences
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Security systems
|2 fast
|
650 |
|
7 |
|a Biometric identification
|2 fast
|
700 |
1 |
|
|a Ling Ngo, David Chek,
|e editor.
|
700 |
1 |
|
|a Jin Teoh, Andrew Beng,
|e editor.
|
700 |
1 |
|
|a Hu, Jiankun,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|t Biometric security.
|d Newcastle upon Tyne, England : Cambridge Scholars Publishing, ©2015
|h x, 485 pages
|z 9781443871839
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=960122
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH28401926
|
938 |
|
|
|a Baker and Taylor
|b BTCP
|n BK0016544876
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL2076603
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr11019537
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 960122
|
938 |
|
|
|a eLibro
|b ELBO
|n ELB155391
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis30594940
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12296351
|
994 |
|
|
|a 92
|b IZTAP
|