Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1355
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dasgupta, D. ; (Dipankar), ; 1958- ; author ; | en_US |
dc.contributor.author | Roy, Arunava, ; author ; | en_US |
dc.contributor.author | Nag, Abhijit, ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:01Z | - |
dc.date.available | 2020-05-17T08:28:01Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319588087 ; | en_US |
dc.identifier.isbn | 3319588087 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1355 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Original ; 3319588060 ; 9783319588063 ; (OCoLC)982605248 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Dipankar Dasgupta, Arunava Roy, Abhijit Nag | en_US |
dc.description.tableofcontents | Preface; Contents; About the Authors; 1 Authentication Basics; Introduction; Types of Authentication Approaches; Type I: What You Knowe; Password; PIN Passwords; An Incident Regarding PIN-Based Authentication; Security Questions; Type II: What You Havee; Photo ID; Swipe Card and Smart Card; Security Dongles; CAPTCHA; Type III: What You Aree; Behavioral Attributes; Physiological Attributes; Type IV: Where You Aree; User Account Types; Chapter Summary; Descriptive Questions; Multiple-Choice Questions; References; 2 Biometric Authentication; Introduction; Different Biometric Modalities ; | en_US |
dc.description.tableofcontents | Biometric Authentication ProcessPerformance Measures of Biometric Systems; False Acceptance Rate (FAR); False Rejection Rate (FRR); Equal Error Rate (EER); Failure to Enroll Rate (FTE); Failure to Acquire Rate (FTA); Details of Biometric Authentication Modalities; Face Recognition; Fingerprint Recognition; Iris Recognition; Retina Recognition; Hand Geometry; Voice (Speaker) Recognition; Keystroke Recognition; Gait-Based Recognition; Passthoughts; Brainprint; Applications of Biometrics; Banking; Computer Access; Immigration; National Identity; Prisons; Telecommunications; Time and Attendance ; | en_US |
dc.description.tableofcontents | Limitations of Biometric SystemsNew Biometric Challenges; Attacks on Biometric-Based Authentication Systems; Mitigating Different Attacks on Biometric Systems; Liveness Detection Mechanisms; Steganographic and Watermarking Techniques; Challenge-Response Systems; Multimodal Biometric Systems; Soft Biometrics; Cancelable Biometrics; Comparative Evaluation; Chapter Summary; Review Questions; Multiple Choice Questions; References; 3 Negative Authentication Systems; Introduction; Concept of Negative Authentication; Types of NAS; Binary-Valued NAS (B-NAS); Real-Valued NAS (R-NAS) ; | en_US |
dc.description.tableofcontents | Grid-Based NAS (G-NAS)Implementation of Negative Authentication System (NAS); Hashed String Generation; Confusion Parameter; Detector Coverage; B-NAS Implementation; Experimental Results for B-NAS Implementation; R-NAS Implementation; Experimental Results for R-NAS Implementation; Modification of the Self-region for B-NAS and R-NAS; G-NAS Implementation; Mapping of Self-points to Grid; Experimental Results for G-NAS; Matrix-Based NAS Approach; Comparisons Among Different Approaches of NAS; NAS Architectural Design and Prototype System; Chapter Summary; Review Questions; References ; | en_US |
dc.description.tableofcontents | 4 Pseudo-Passwords and Non-textual ApproachesEvolution of Hash Functions; Honeyword Approach; Honeychecker; Use of Password Vaults; NLEs from the n-Gram Model Concept; NLEs from the PCFG Model Concept; Encoding or Decoding of the Sub-grammar (SG); Evaluating the Encoders; Evaluating Single Passwords; NoCrack Password Vaults; Bloom Filter; Constructing Bloom Filters; Comparison of Complementary Approaches: NAS (G-NAS, GM-NAS), Honeywords, and Bloom Filter; Non-textual Passwords; Recognition-Based Techniques; Recall-Based Techniques; Security Aspects and Possible Attacks on Graphical Passwords ; | en_US |
dc.format.extent | 1 online resource ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Infosys Science Foundation series ; | en_US |
dc.relation.ispartofseries | Infosys Science Foundation series. Applied sciences and engineering ; | en_US |
dc.relation.ispartofseries | Infosys Science Foundation series ; | en_US |
dc.relation.ispartofseries | Infosys Science Foundation series. ; Applied sciences and engineering ; | en_US |
dc.relation.haspart | 9783319588087.pdf | en_US |
dc.subject | Computers ; Access control ; | en_US |
dc.subject | Computer networks ; Access control ; | en_US |
dc.title | Advances in user authentication / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
dc.classification.dc | 005.8/3 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319588087.pdf | 19.86 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dasgupta, D. ; (Dipankar), ; 1958- ; author ; | en_US |
dc.contributor.author | Roy, Arunava, ; author ; | en_US |
dc.contributor.author | Nag, Abhijit, ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:01Z | - |
dc.date.available | 2020-05-17T08:28:01Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319588087 ; | en_US |
dc.identifier.isbn | 3319588087 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1355 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Original ; 3319588060 ; 9783319588063 ; (OCoLC)982605248 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Dipankar Dasgupta, Arunava Roy, Abhijit Nag | en_US |
dc.description.tableofcontents | Preface; Contents; About the Authors; 1 Authentication Basics; Introduction; Types of Authentication Approaches; Type I: What You Knowe; Password; PIN Passwords; An Incident Regarding PIN-Based Authentication; Security Questions; Type II: What You Havee; Photo ID; Swipe Card and Smart Card; Security Dongles; CAPTCHA; Type III: What You Aree; Behavioral Attributes; Physiological Attributes; Type IV: Where You Aree; User Account Types; Chapter Summary; Descriptive Questions; Multiple-Choice Questions; References; 2 Biometric Authentication; Introduction; Different Biometric Modalities ; | en_US |
dc.description.tableofcontents | Biometric Authentication ProcessPerformance Measures of Biometric Systems; False Acceptance Rate (FAR); False Rejection Rate (FRR); Equal Error Rate (EER); Failure to Enroll Rate (FTE); Failure to Acquire Rate (FTA); Details of Biometric Authentication Modalities; Face Recognition; Fingerprint Recognition; Iris Recognition; Retina Recognition; Hand Geometry; Voice (Speaker) Recognition; Keystroke Recognition; Gait-Based Recognition; Passthoughts; Brainprint; Applications of Biometrics; Banking; Computer Access; Immigration; National Identity; Prisons; Telecommunications; Time and Attendance ; | en_US |
dc.description.tableofcontents | Limitations of Biometric SystemsNew Biometric Challenges; Attacks on Biometric-Based Authentication Systems; Mitigating Different Attacks on Biometric Systems; Liveness Detection Mechanisms; Steganographic and Watermarking Techniques; Challenge-Response Systems; Multimodal Biometric Systems; Soft Biometrics; Cancelable Biometrics; Comparative Evaluation; Chapter Summary; Review Questions; Multiple Choice Questions; References; 3 Negative Authentication Systems; Introduction; Concept of Negative Authentication; Types of NAS; Binary-Valued NAS (B-NAS); Real-Valued NAS (R-NAS) ; | en_US |
dc.description.tableofcontents | Grid-Based NAS (G-NAS)Implementation of Negative Authentication System (NAS); Hashed String Generation; Confusion Parameter; Detector Coverage; B-NAS Implementation; Experimental Results for B-NAS Implementation; R-NAS Implementation; Experimental Results for R-NAS Implementation; Modification of the Self-region for B-NAS and R-NAS; G-NAS Implementation; Mapping of Self-points to Grid; Experimental Results for G-NAS; Matrix-Based NAS Approach; Comparisons Among Different Approaches of NAS; NAS Architectural Design and Prototype System; Chapter Summary; Review Questions; References ; | en_US |
dc.description.tableofcontents | 4 Pseudo-Passwords and Non-textual ApproachesEvolution of Hash Functions; Honeyword Approach; Honeychecker; Use of Password Vaults; NLEs from the n-Gram Model Concept; NLEs from the PCFG Model Concept; Encoding or Decoding of the Sub-grammar (SG); Evaluating the Encoders; Evaluating Single Passwords; NoCrack Password Vaults; Bloom Filter; Constructing Bloom Filters; Comparison of Complementary Approaches: NAS (G-NAS, GM-NAS), Honeywords, and Bloom Filter; Non-textual Passwords; Recognition-Based Techniques; Recall-Based Techniques; Security Aspects and Possible Attacks on Graphical Passwords ; | en_US |
dc.format.extent | 1 online resource ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Infosys Science Foundation series ; | en_US |
dc.relation.ispartofseries | Infosys Science Foundation series. Applied sciences and engineering ; | en_US |
dc.relation.ispartofseries | Infosys Science Foundation series ; | en_US |
dc.relation.ispartofseries | Infosys Science Foundation series. ; Applied sciences and engineering ; | en_US |
dc.relation.haspart | 9783319588087.pdf | en_US |
dc.subject | Computers ; Access control ; | en_US |
dc.subject | Computer networks ; Access control ; | en_US |
dc.title | Advances in user authentication / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
dc.classification.dc | 005.8/3 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319588087.pdf | 19.86 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dasgupta, D. ; (Dipankar), ; 1958- ; author ; | en_US |
dc.contributor.author | Roy, Arunava, ; author ; | en_US |
dc.contributor.author | Nag, Abhijit, ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:01Z | - |
dc.date.available | 2020-05-17T08:28:01Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319588087 ; | en_US |
dc.identifier.isbn | 3319588087 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1355 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Original ; 3319588060 ; 9783319588063 ; (OCoLC)982605248 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Dipankar Dasgupta, Arunava Roy, Abhijit Nag | en_US |
dc.description.tableofcontents | Preface; Contents; About the Authors; 1 Authentication Basics; Introduction; Types of Authentication Approaches; Type I: What You Knowe; Password; PIN Passwords; An Incident Regarding PIN-Based Authentication; Security Questions; Type II: What You Havee; Photo ID; Swipe Card and Smart Card; Security Dongles; CAPTCHA; Type III: What You Aree; Behavioral Attributes; Physiological Attributes; Type IV: Where You Aree; User Account Types; Chapter Summary; Descriptive Questions; Multiple-Choice Questions; References; 2 Biometric Authentication; Introduction; Different Biometric Modalities ; | en_US |
dc.description.tableofcontents | Biometric Authentication ProcessPerformance Measures of Biometric Systems; False Acceptance Rate (FAR); False Rejection Rate (FRR); Equal Error Rate (EER); Failure to Enroll Rate (FTE); Failure to Acquire Rate (FTA); Details of Biometric Authentication Modalities; Face Recognition; Fingerprint Recognition; Iris Recognition; Retina Recognition; Hand Geometry; Voice (Speaker) Recognition; Keystroke Recognition; Gait-Based Recognition; Passthoughts; Brainprint; Applications of Biometrics; Banking; Computer Access; Immigration; National Identity; Prisons; Telecommunications; Time and Attendance ; | en_US |
dc.description.tableofcontents | Limitations of Biometric SystemsNew Biometric Challenges; Attacks on Biometric-Based Authentication Systems; Mitigating Different Attacks on Biometric Systems; Liveness Detection Mechanisms; Steganographic and Watermarking Techniques; Challenge-Response Systems; Multimodal Biometric Systems; Soft Biometrics; Cancelable Biometrics; Comparative Evaluation; Chapter Summary; Review Questions; Multiple Choice Questions; References; 3 Negative Authentication Systems; Introduction; Concept of Negative Authentication; Types of NAS; Binary-Valued NAS (B-NAS); Real-Valued NAS (R-NAS) ; | en_US |
dc.description.tableofcontents | Grid-Based NAS (G-NAS)Implementation of Negative Authentication System (NAS); Hashed String Generation; Confusion Parameter; Detector Coverage; B-NAS Implementation; Experimental Results for B-NAS Implementation; R-NAS Implementation; Experimental Results for R-NAS Implementation; Modification of the Self-region for B-NAS and R-NAS; G-NAS Implementation; Mapping of Self-points to Grid; Experimental Results for G-NAS; Matrix-Based NAS Approach; Comparisons Among Different Approaches of NAS; NAS Architectural Design and Prototype System; Chapter Summary; Review Questions; References ; | en_US |
dc.description.tableofcontents | 4 Pseudo-Passwords and Non-textual ApproachesEvolution of Hash Functions; Honeyword Approach; Honeychecker; Use of Password Vaults; NLEs from the n-Gram Model Concept; NLEs from the PCFG Model Concept; Encoding or Decoding of the Sub-grammar (SG); Evaluating the Encoders; Evaluating Single Passwords; NoCrack Password Vaults; Bloom Filter; Constructing Bloom Filters; Comparison of Complementary Approaches: NAS (G-NAS, GM-NAS), Honeywords, and Bloom Filter; Non-textual Passwords; Recognition-Based Techniques; Recall-Based Techniques; Security Aspects and Possible Attacks on Graphical Passwords ; | en_US |
dc.format.extent | 1 online resource ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Infosys Science Foundation series ; | en_US |
dc.relation.ispartofseries | Infosys Science Foundation series. Applied sciences and engineering ; | en_US |
dc.relation.ispartofseries | Infosys Science Foundation series ; | en_US |
dc.relation.ispartofseries | Infosys Science Foundation series. ; Applied sciences and engineering ; | en_US |
dc.relation.haspart | 9783319588087.pdf | en_US |
dc.subject | Computers ; Access control ; | en_US |
dc.subject | Computer networks ; Access control ; | en_US |
dc.title | Advances in user authentication / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
dc.classification.dc | 005.8/3 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319588087.pdf | 19.86 MB | Adobe PDF | Preview File |