Iris biometric model for secured network access / Franjieh El Khoury.

"The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the...

Full description

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2013
Language:English
Online Access:
Physical Description:xvii, 194 p. :; ill.
Notes:"An Auerbach book."
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02439nam a2200409 a 4500
001 5001177222
003 MiAaPQ
005 20200520144314.0
006 m o d |
007 cr cn|||||||||
008 130321s2013 fluad sb 001 0 eng d
010 |z  2012051055 
020 |z 9781466502130 (hardback) 
020 |a 9781466502147 (electronic bk.) 
035 |a (MiAaPQ)5001177222 
035 |a (Au-PeEL)EBL1177222 
035 |a (CaPaEBR)ebr10691559 
035 |a (CaONFJC)MIL502287 
035 |a (OCoLC)841809646 
040 |a MiAaPQ  |c MiAaPQ  |d MiAaPQ 
050 4 |a TK7882.B56  |b K46 2013 
082 0 4 |a 005.8  |2 23 
100 1 |a Khoury, Franjieh El. 
245 1 0 |a Iris biometric model for secured network access  |h [electronic resource] /  |c Franjieh El Khoury. 
260 |a Boca Raton :  |b CRC Press,  |c 2013. 
300 |a xvii, 194 p. :  |b ill. 
500 |a "An Auerbach book." 
504 |a Includes bibliographical references and index. 
505 0 |a pt. 1. State of the art -- pt. 2. Critical analysis of methods of iris recognition -- pt. 3. Our proposed model : the iris crypto agent system -- pt. 4. Implementation and simulations. 
520 |a "The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one hand the transition from a centralized to a decentralized system distributed locally or remotely, has facilitated the tasks in various sectors (i.e., educational, social, government, commercial, etc.). On the other hand, the integration of the Internet has encouraged communication at international level, and allowed operations remotely (i.e., e-commerce, e-banking, etc.). Besides the Internet, there is the mobile network that provides advanced services (i.e., multimedia messaging, Internet access, etc.)"--  |c Provided by publisher. 
533 |a Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. 
650 0 |a Biometric identification. 
650 0 |a Iris (Eye) 
650 0 |a Computer networks  |x Security measures. 
655 4 |a Electronic books. 
710 2 |a ProQuest (Firm) 
856 4 0 |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1177222  |z Click to View