Iris biometric model for secured network access

"The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the...

Full description

Bibliographic Details
Main Author: El Khoury, Franjieh
Format: eBook
Language:English
Published: Boca Raton CRC Press 2013
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02898nmm a2200541 u 4500
001 EB001927794
003 EBX01000000000000001090696
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9781299710368 
020 |a 9781466502147 
020 |a 1466502142 
050 4 |a TK7882.B56 
100 1 |a El Khoury, Franjieh 
245 0 0 |a Iris biometric model for secured network access  |c Franjieh El Khoury 
260 |a Boca Raton  |b CRC Press  |c 2013 
300 |a xvii, 204 pages 
505 0 |a Includes bibliographical references and index 
505 0 |a pt. 1. State of the art -- pt. 2. Critical analysis of methods of iris recognition -- pt. 3. Our proposed model : the iris crypto agent system -- pt. 4. Implementation and simulations 
653 |a Iris (Eye) / http://id.loc.gov/authorities/subjects/sh85068076 
653 |a COMPUTERS / Internet / Security / bisacsh 
653 |a Biometric identification / http://id.loc.gov/authorities/subjects/sh2001010964 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a COMPUTERS / Networking / Security / bisacsh 
653 |a Iris (Anatomie) 
653 |a Computer networks / Security measures / fast 
653 |a Biometric identification / fast 
653 |a TECHNOLOGY & ENGINEERING / Imaging Systems / bisacsh 
653 |a COMPUTERS / Security / Cryptography / bisacsh 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Iris (Eye) / fast 
653 |a Identification biométrique 
653 |a COMPUTERS / Security / General / bisacsh 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
015 |a GBB7C5587 
024 8 |a 10.1201/b14817 
776 |z 9781138198722 
776 |z 1466502142 
776 |z 1466502134 
776 |z 9781466502147 
776 |z 9781466502130 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781466502147/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 620 
082 0 |a 005.8 
520 |a "The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one hand the transition from a centralized to a decentralized system distributed locally or remotely, has facilitated the tasks in various sectors (i.e., educational, social, government, commercial, etc.). On the other hand, the integration of the Internet has encouraged communication at international level, and allowed operations remotely (i.e., e-commerce, e-banking, etc.). Besides the Internet, there is the mobile network that provides advanced services (i.e., multimedia messaging, Internet access, etc.)"--