Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1355
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDasgupta, D. ; (Dipankar), ; 1958- ; author ;en_US
dc.contributor.authorRoy, Arunava, ; author ;en_US
dc.contributor.authorNag, Abhijit, ; author ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:01Z-
dc.date.available2020-05-17T08:28:01Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319588087 ;en_US
dc.identifier.isbn3319588087 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1355-
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionen_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionOriginal ; 3319588060 ; 9783319588063 ; (OCoLC)982605248 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.statementofresponsibilityDipankar Dasgupta, Arunava Roy, Abhijit Nagen_US
dc.description.tableofcontentsPreface; Contents; About the Authors; 1 Authentication Basics; Introduction; Types of Authentication Approaches; Type I: What You Knowe; Password; PIN Passwords; An Incident Regarding PIN-Based Authentication; Security Questions; Type II: What You Havee; Photo ID; Swipe Card and Smart Card; Security Dongles; CAPTCHA; Type III: What You Aree; Behavioral Attributes; Physiological Attributes; Type IV: Where You Aree; User Account Types; Chapter Summary; Descriptive Questions; Multiple-Choice Questions; References; 2 Biometric Authentication; Introduction; Different Biometric Modalities ;en_US
dc.description.tableofcontentsBiometric Authentication ProcessPerformance Measures of Biometric Systems; False Acceptance Rate (FAR); False Rejection Rate (FRR); Equal Error Rate (EER); Failure to Enroll Rate (FTE); Failure to Acquire Rate (FTA); Details of Biometric Authentication Modalities; Face Recognition; Fingerprint Recognition; Iris Recognition; Retina Recognition; Hand Geometry; Voice (Speaker) Recognition; Keystroke Recognition; Gait-Based Recognition; Passthoughts; Brainprint; Applications of Biometrics; Banking; Computer Access; Immigration; National Identity; Prisons; Telecommunications; Time and Attendance ;en_US
dc.description.tableofcontentsLimitations of Biometric SystemsNew Biometric Challenges; Attacks on Biometric-Based Authentication Systems; Mitigating Different Attacks on Biometric Systems; Liveness Detection Mechanisms; Steganographic and Watermarking Techniques; Challenge-Response Systems; Multimodal Biometric Systems; Soft Biometrics; Cancelable Biometrics; Comparative Evaluation; Chapter Summary; Review Questions; Multiple Choice Questions; References; 3 Negative Authentication Systems; Introduction; Concept of Negative Authentication; Types of NAS; Binary-Valued NAS (B-NAS); Real-Valued NAS (R-NAS) ;en_US
dc.description.tableofcontentsGrid-Based NAS (G-NAS)Implementation of Negative Authentication System (NAS); Hashed String Generation; Confusion Parameter; Detector Coverage; B-NAS Implementation; Experimental Results for B-NAS Implementation; R-NAS Implementation; Experimental Results for R-NAS Implementation; Modification of the Self-region for B-NAS and R-NAS; G-NAS Implementation; Mapping of Self-points to Grid; Experimental Results for G-NAS; Matrix-Based NAS Approach; Comparisons Among Different Approaches of NAS; NAS Architectural Design and Prototype System; Chapter Summary; Review Questions; References ;en_US
dc.description.tableofcontents4 Pseudo-Passwords and Non-textual ApproachesEvolution of Hash Functions; Honeyword Approach; Honeychecker; Use of Password Vaults; NLEs from the n-Gram Model Concept; NLEs from the PCFG Model Concept; Encoding or Decoding of the Sub-grammar (SG); Evaluating the Encoders; Evaluating Single Passwords; NoCrack Password Vaults; Bloom Filter; Constructing Bloom Filters; Comparison of Complementary Approaches: NAS (G-NAS, GM-NAS), Honeywords, and Bloom Filter; Non-textual Passwords; Recognition-Based Techniques; Recall-Based Techniques; Security Aspects and Possible Attacks on Graphical Passwords ;en_US
dc.format.extent1 online resource ;en_US
dc.publisherSpringer,en_US
dc.relation.ispartofseriesInfosys Science Foundation series ;en_US
dc.relation.ispartofseriesInfosys Science Foundation series. Applied sciences and engineering ;en_US
dc.relation.ispartofseriesInfosys Science Foundation series ;en_US
dc.relation.ispartofseriesInfosys Science Foundation series. ; Applied sciences and engineering ;en_US
dc.relation.haspart9783319588087.pdfen_US
dc.subjectComputers ; Access control ;en_US
dc.subjectComputer networks ; Access control ;en_US
dc.titleAdvances in user authentication /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.classification.dc005.8/3 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319588087.pdf19.86 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDasgupta, D. ; (Dipankar), ; 1958- ; author ;en_US
dc.contributor.authorRoy, Arunava, ; author ;en_US
dc.contributor.authorNag, Abhijit, ; author ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:01Z-
dc.date.available2020-05-17T08:28:01Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319588087 ;en_US
dc.identifier.isbn3319588087 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1355-
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionen_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionOriginal ; 3319588060 ; 9783319588063 ; (OCoLC)982605248 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.statementofresponsibilityDipankar Dasgupta, Arunava Roy, Abhijit Nagen_US
dc.description.tableofcontentsPreface; Contents; About the Authors; 1 Authentication Basics; Introduction; Types of Authentication Approaches; Type I: What You Knowe; Password; PIN Passwords; An Incident Regarding PIN-Based Authentication; Security Questions; Type II: What You Havee; Photo ID; Swipe Card and Smart Card; Security Dongles; CAPTCHA; Type III: What You Aree; Behavioral Attributes; Physiological Attributes; Type IV: Where You Aree; User Account Types; Chapter Summary; Descriptive Questions; Multiple-Choice Questions; References; 2 Biometric Authentication; Introduction; Different Biometric Modalities ;en_US
dc.description.tableofcontentsBiometric Authentication ProcessPerformance Measures of Biometric Systems; False Acceptance Rate (FAR); False Rejection Rate (FRR); Equal Error Rate (EER); Failure to Enroll Rate (FTE); Failure to Acquire Rate (FTA); Details of Biometric Authentication Modalities; Face Recognition; Fingerprint Recognition; Iris Recognition; Retina Recognition; Hand Geometry; Voice (Speaker) Recognition; Keystroke Recognition; Gait-Based Recognition; Passthoughts; Brainprint; Applications of Biometrics; Banking; Computer Access; Immigration; National Identity; Prisons; Telecommunications; Time and Attendance ;en_US
dc.description.tableofcontentsLimitations of Biometric SystemsNew Biometric Challenges; Attacks on Biometric-Based Authentication Systems; Mitigating Different Attacks on Biometric Systems; Liveness Detection Mechanisms; Steganographic and Watermarking Techniques; Challenge-Response Systems; Multimodal Biometric Systems; Soft Biometrics; Cancelable Biometrics; Comparative Evaluation; Chapter Summary; Review Questions; Multiple Choice Questions; References; 3 Negative Authentication Systems; Introduction; Concept of Negative Authentication; Types of NAS; Binary-Valued NAS (B-NAS); Real-Valued NAS (R-NAS) ;en_US
dc.description.tableofcontentsGrid-Based NAS (G-NAS)Implementation of Negative Authentication System (NAS); Hashed String Generation; Confusion Parameter; Detector Coverage; B-NAS Implementation; Experimental Results for B-NAS Implementation; R-NAS Implementation; Experimental Results for R-NAS Implementation; Modification of the Self-region for B-NAS and R-NAS; G-NAS Implementation; Mapping of Self-points to Grid; Experimental Results for G-NAS; Matrix-Based NAS Approach; Comparisons Among Different Approaches of NAS; NAS Architectural Design and Prototype System; Chapter Summary; Review Questions; References ;en_US
dc.description.tableofcontents4 Pseudo-Passwords and Non-textual ApproachesEvolution of Hash Functions; Honeyword Approach; Honeychecker; Use of Password Vaults; NLEs from the n-Gram Model Concept; NLEs from the PCFG Model Concept; Encoding or Decoding of the Sub-grammar (SG); Evaluating the Encoders; Evaluating Single Passwords; NoCrack Password Vaults; Bloom Filter; Constructing Bloom Filters; Comparison of Complementary Approaches: NAS (G-NAS, GM-NAS), Honeywords, and Bloom Filter; Non-textual Passwords; Recognition-Based Techniques; Recall-Based Techniques; Security Aspects and Possible Attacks on Graphical Passwords ;en_US
dc.format.extent1 online resource ;en_US
dc.publisherSpringer,en_US
dc.relation.ispartofseriesInfosys Science Foundation series ;en_US
dc.relation.ispartofseriesInfosys Science Foundation series. Applied sciences and engineering ;en_US
dc.relation.ispartofseriesInfosys Science Foundation series ;en_US
dc.relation.ispartofseriesInfosys Science Foundation series. ; Applied sciences and engineering ;en_US
dc.relation.haspart9783319588087.pdfen_US
dc.subjectComputers ; Access control ;en_US
dc.subjectComputer networks ; Access control ;en_US
dc.titleAdvances in user authentication /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.classification.dc005.8/3 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319588087.pdf19.86 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDasgupta, D. ; (Dipankar), ; 1958- ; author ;en_US
dc.contributor.authorRoy, Arunava, ; author ;en_US
dc.contributor.authorNag, Abhijit, ; author ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:01Z-
dc.date.available2020-05-17T08:28:01Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319588087 ;en_US
dc.identifier.isbn3319588087 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1355-
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionen_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionOriginal ; 3319588060 ; 9783319588063 ; (OCoLC)982605248 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.statementofresponsibilityDipankar Dasgupta, Arunava Roy, Abhijit Nagen_US
dc.description.tableofcontentsPreface; Contents; About the Authors; 1 Authentication Basics; Introduction; Types of Authentication Approaches; Type I: What You Knowe; Password; PIN Passwords; An Incident Regarding PIN-Based Authentication; Security Questions; Type II: What You Havee; Photo ID; Swipe Card and Smart Card; Security Dongles; CAPTCHA; Type III: What You Aree; Behavioral Attributes; Physiological Attributes; Type IV: Where You Aree; User Account Types; Chapter Summary; Descriptive Questions; Multiple-Choice Questions; References; 2 Biometric Authentication; Introduction; Different Biometric Modalities ;en_US
dc.description.tableofcontentsBiometric Authentication ProcessPerformance Measures of Biometric Systems; False Acceptance Rate (FAR); False Rejection Rate (FRR); Equal Error Rate (EER); Failure to Enroll Rate (FTE); Failure to Acquire Rate (FTA); Details of Biometric Authentication Modalities; Face Recognition; Fingerprint Recognition; Iris Recognition; Retina Recognition; Hand Geometry; Voice (Speaker) Recognition; Keystroke Recognition; Gait-Based Recognition; Passthoughts; Brainprint; Applications of Biometrics; Banking; Computer Access; Immigration; National Identity; Prisons; Telecommunications; Time and Attendance ;en_US
dc.description.tableofcontentsLimitations of Biometric SystemsNew Biometric Challenges; Attacks on Biometric-Based Authentication Systems; Mitigating Different Attacks on Biometric Systems; Liveness Detection Mechanisms; Steganographic and Watermarking Techniques; Challenge-Response Systems; Multimodal Biometric Systems; Soft Biometrics; Cancelable Biometrics; Comparative Evaluation; Chapter Summary; Review Questions; Multiple Choice Questions; References; 3 Negative Authentication Systems; Introduction; Concept of Negative Authentication; Types of NAS; Binary-Valued NAS (B-NAS); Real-Valued NAS (R-NAS) ;en_US
dc.description.tableofcontentsGrid-Based NAS (G-NAS)Implementation of Negative Authentication System (NAS); Hashed String Generation; Confusion Parameter; Detector Coverage; B-NAS Implementation; Experimental Results for B-NAS Implementation; R-NAS Implementation; Experimental Results for R-NAS Implementation; Modification of the Self-region for B-NAS and R-NAS; G-NAS Implementation; Mapping of Self-points to Grid; Experimental Results for G-NAS; Matrix-Based NAS Approach; Comparisons Among Different Approaches of NAS; NAS Architectural Design and Prototype System; Chapter Summary; Review Questions; References ;en_US
dc.description.tableofcontents4 Pseudo-Passwords and Non-textual ApproachesEvolution of Hash Functions; Honeyword Approach; Honeychecker; Use of Password Vaults; NLEs from the n-Gram Model Concept; NLEs from the PCFG Model Concept; Encoding or Decoding of the Sub-grammar (SG); Evaluating the Encoders; Evaluating Single Passwords; NoCrack Password Vaults; Bloom Filter; Constructing Bloom Filters; Comparison of Complementary Approaches: NAS (G-NAS, GM-NAS), Honeywords, and Bloom Filter; Non-textual Passwords; Recognition-Based Techniques; Recall-Based Techniques; Security Aspects and Possible Attacks on Graphical Passwords ;en_US
dc.format.extent1 online resource ;en_US
dc.publisherSpringer,en_US
dc.relation.ispartofseriesInfosys Science Foundation series ;en_US
dc.relation.ispartofseriesInfosys Science Foundation series. Applied sciences and engineering ;en_US
dc.relation.ispartofseriesInfosys Science Foundation series ;en_US
dc.relation.ispartofseriesInfosys Science Foundation series. ; Applied sciences and engineering ;en_US
dc.relation.haspart9783319588087.pdfen_US
dc.subjectComputers ; Access control ;en_US
dc.subjectComputer networks ; Access control ;en_US
dc.titleAdvances in user authentication /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.classification.dc005.8/3 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319588087.pdf19.86 MBAdobe PDFThumbnail
Preview File