Description |
1 online resource (xvii, 204 pages) |
|
data file |
Summary |
"The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one hand the transition from a centralized to a decentralized system distributed locally or remotely, has facilitated the tasks in various sectors (i.e., educational, social, government, commercial, etc.). On the other hand, the integration of the Internet has encouraged communication at international level, and allowed operations remotely (i.e., e-commerce, e-banking, etc.). Besides the Internet, there is the mobile network that provides advanced services (i.e., multimedia messaging, Internet access, etc.)"-- Provided by publisher |
Bibliography |
Includes bibliographical references and index. |
Contents |
pt. 1. State of the art -- pt. 2. Critical analysis of methods of iris recognition -- pt. 3. Our proposed model : the iris crypto agent system -- pt. 4. Implementation and simulations. |
Subject |
Biometric identification.
|
|
Iris (Eye)
|
|
Computer networks -- Security measures.
|
|
Identification biométrique. |
|
Iris (Anatomie) |
|
Réseaux d'ordinateurs -- Sécurité -- Mesures. |
|
Biometric identification |
|
Computer networks -- Security measures |
|
Iris (Eye) |
Other Form: |
Print version: Khoury, Franjieh El. Iris biometric model for secured network access. Boca Raton : CRC Press, 2013 9781466502130 (DLC) 2012051055 (OCoLC)748331600 |
ISBN |
9781466502147 (electronic bk.) |
|
1466502142 (electronic bk.) |
|
9781299710368 (MyiLibrary) |
|
1299710360 (MyiLibrary) |
Standard No. |
10.1201/b14817 doi |
|