|
|
|
|
LEADER |
03978nam a22006015i 4500 |
001 |
978-3-319-58808-7 |
003 |
DE-He213 |
005 |
20210623115453.0 |
007 |
cr nn 008mamaa |
008 |
170822s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319588087
|9 978-3-319-58808-7
|
024 |
7 |
|
|a 10.1007/978-3-319-58808-7
|2 doi
|
050 |
|
4 |
|a QA268
|
050 |
|
4 |
|a Q350-390
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a GPF
|2 thema
|
082 |
0 |
4 |
|a 003.54
|2 23
|
100 |
1 |
|
|a Dasgupta, Dipankar.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Advances in User Authentication
|h [electronic resource] /
|c by Dipankar Dasgupta, Arunava Roy, Abhijit Nag.
|
250 |
|
|
|a 1st ed. 2017.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XIV, 360 p. 165 illus., 128 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Infosys Science Foundation Series in Applied Sciences and Engineering,
|x 2363-4995
|
505 |
0 |
|
|a Authentication Basics -- Biometric Authentication -- Negative Authentication Systems -- Pseudo-Passwords and Non-Textual Approaches -- Multi-Factor Authentication -- Continuous Authentication -- Adaptive Multi-Factor Authentication.
|
520 |
|
|
|a This book is dedicated to advances in the field of user authentication. The book covers detailed description of the authentication process as well as types of authentication modalities along with their several features (authentication factors). It discusses the use of these modalities in a time-varying operating environment, including factors such as devices, media and surrounding conditions, like light, noise, etc. The book is divided into several parts that cover descriptions of several biometric and non-biometric authentication modalities, single factor and multi-factor authentication systems (mainly, adaptive), negative authentication system, etc. Adaptive strategy ensures the incorporation of the existing environmental conditions on the selection of authentication factors and provides significant diversity in the selection process. The contents of this book will prove useful to practitioners, researchers and students. The book is suited to be used a text in advanced/graduate courses on User Authentication Modalities. It can also be used as a textbook for professional development and certification coursework for practicing engineers and computer scientists. .
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Biometrics (Biology).
|
650 |
1 |
4 |
|a Coding and Information Theory.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I15041
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060
|
650 |
2 |
4 |
|a Data Storage Representation.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I15025
|
650 |
2 |
4 |
|a Biometrics.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I22040
|
700 |
1 |
|
|a Roy, Arunava.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Nag, Abhijit.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319588063
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319588070
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319864785
|
830 |
|
0 |
|a Infosys Science Foundation Series in Applied Sciences and Engineering,
|x 2363-4995
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-58808-7
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|