menu
{ "item_title" : "USER BIOMETRICS AUTHENTICATION (Comprehensive Analysis)", "item_author" : [" Abdul Razaque "], "item_description" : "As the capabilities of mobile devices increase, their security is becoming more of an issue. Passwords and PINs are the lowest forms of security, yet they are the most widely used. Continuous authentication using behavioral biometrics and multimodal biometrics provides a way to greatly increase security. Using behavioral biometrics, such as linguistic profiling, keystroke dynamics, and behavior profiling, with text messages is a good way to analyze data and determine the identity of the user. Deciding which forms of authentication to use depends on the system the security is being provided for. User authentication in the workplace is a major concern. An effortless way to improve security would be to use a biometric-enabled bracelet to authorize and de-authorize a user when using a computer and when walking away. This book extensively surveyed the biometric user-authentication and particularly focused on mobile biometric authentication including emerging biometric authentication processes.", "item_img_path" : "https://covers3.booksamillion.com/covers/bam/1/79/474/859/1794748598_b.jpg", "price_data" : { "retail_price" : "44.56", "online_price" : "44.56", "our_price" : "44.56", "club_price" : "44.56", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
USER BIOMETRICS AUTHENTICATION (Comprehensive Analysis)|Abdul Razaque

USER BIOMETRICS AUTHENTICATION (Comprehensive Analysis)

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

As the capabilities of mobile devices increase, their security is becoming more of an issue. Passwords and PINs are the lowest forms of security, yet they are the most widely used. Continuous authentication using behavioral biometrics and multimodal biometrics provides a way to greatly increase security. Using behavioral biometrics, such as linguistic profiling, keystroke dynamics, and behavior profiling, with text messages is a good way to analyze data and determine the identity of the user. Deciding which forms of authentication to use depends on the system the security is being provided for. User authentication in the workplace is a major concern. An effortless way to improve security would be to use a biometric-enabled bracelet to authorize and de-authorize a user when using a computer and when walking away. This book extensively surveyed the biometric user-authentication and particularly focused on mobile biometric authentication including emerging biometric authentication processes.

This item is Non-Returnable

Details

  • ISBN-13: 9781794748590
  • ISBN-10: 1794748598
  • Publisher: Lulu.com
  • Publish Date: November 2019
  • Dimensions: 11 x 8.5 x 0.26 inches
  • Shipping Weight: 0.77 pounds
  • Page Count: 102

Related Categories

You May Also Like...

    1

BAM Customer Reviews