Iris biometric model for secured network access / Franjieh El Khoury.
"The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the...
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2013 |
Language: | English |
Online Access: | |
Physical Description: | xvii, 194 p. :; ill. |
Notes: | "An Auerbach book." |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
5001177222 |
---|---|
ctrlnum |
(MiAaPQ)5001177222 (Au-PeEL)EBL1177222 (CaPaEBR)ebr10691559 (CaONFJC)MIL502287 (OCoLC)841809646 |
collection |
bib_alma |
record_format |
marc |
spelling |
Khoury, Franjieh El. Iris biometric model for secured network access [electronic resource] / Franjieh El Khoury. Boca Raton : CRC Press, 2013. xvii, 194 p. : ill. "An Auerbach book." Includes bibliographical references and index. pt. 1. State of the art -- pt. 2. Critical analysis of methods of iris recognition -- pt. 3. Our proposed model : the iris crypto agent system -- pt. 4. Implementation and simulations. "The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one hand the transition from a centralized to a decentralized system distributed locally or remotely, has facilitated the tasks in various sectors (i.e., educational, social, government, commercial, etc.). On the other hand, the integration of the Internet has encouraged communication at international level, and allowed operations remotely (i.e., e-commerce, e-banking, etc.). Besides the Internet, there is the mobile network that provides advanced services (i.e., multimedia messaging, Internet access, etc.)"-- Provided by publisher. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Biometric identification. Iris (Eye) Computer networks Security measures. Electronic books. ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1177222 Click to View |
language |
English |
format |
Electronic eBook |
author |
Khoury, Franjieh El. |
spellingShingle |
Khoury, Franjieh El. Iris biometric model for secured network access pt. 1. State of the art -- pt. 2. Critical analysis of methods of iris recognition -- pt. 3. Our proposed model : the iris crypto agent system -- pt. 4. Implementation and simulations. |
author_facet |
Khoury, Franjieh El. ProQuest (Firm) ProQuest (Firm) |
author_variant |
f e k fe fek |
author2 |
ProQuest (Firm) |
author2_role |
TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Khoury, Franjieh El. |
title |
Iris biometric model for secured network access |
title_full |
Iris biometric model for secured network access [electronic resource] / Franjieh El Khoury. |
title_fullStr |
Iris biometric model for secured network access [electronic resource] / Franjieh El Khoury. |
title_full_unstemmed |
Iris biometric model for secured network access [electronic resource] / Franjieh El Khoury. |
title_auth |
Iris biometric model for secured network access |
title_new |
Iris biometric model for secured network access |
title_sort |
iris biometric model for secured network access |
publisher |
CRC Press, |
publishDate |
2013 |
physical |
xvii, 194 p. : ill. |
contents |
pt. 1. State of the art -- pt. 2. Critical analysis of methods of iris recognition -- pt. 3. Our proposed model : the iris crypto agent system -- pt. 4. Implementation and simulations. |
isbn |
9781466502147 (electronic bk.) |
callnumber-first |
T - Technology |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
callnumber-label |
TK7882 |
callnumber-sort |
TK 47882 B56 K46 42013 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1177222 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
oclc_num |
841809646 |
work_keys_str_mv |
AT khouryfranjiehel irisbiometricmodelforsecurednetworkaccess AT proquestfirm irisbiometricmodelforsecurednetworkaccess |
status_str |
n |
ids_txt_mv |
(MiAaPQ)5001177222 (Au-PeEL)EBL1177222 (CaPaEBR)ebr10691559 (CaONFJC)MIL502287 (OCoLC)841809646 |
is_hierarchy_title |
Iris biometric model for secured network access |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1792330750466457600 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02439nam a2200409 a 4500</leader><controlfield tag="001">5001177222</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">130321s2013 fluad sb 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2012051055</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781466502130 (hardback)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466502147 (electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5001177222</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL1177222</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10691559</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL502287</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)841809646</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK7882.B56</subfield><subfield code="b">K46 2013</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Khoury, Franjieh El.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Iris biometric model for secured network access</subfield><subfield code="h">[electronic resource] /</subfield><subfield code="c">Franjieh El Khoury.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Boca Raton :</subfield><subfield code="b">CRC Press,</subfield><subfield code="c">2013.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvii, 194 p. :</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"An Auerbach book."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">pt. 1. State of the art -- pt. 2. Critical analysis of methods of iris recognition -- pt. 3. Our proposed model : the iris crypto agent system -- pt. 4. Implementation and simulations.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one hand the transition from a centralized to a decentralized system distributed locally or remotely, has facilitated the tasks in various sectors (i.e., educational, social, government, commercial, etc.). On the other hand, the integration of the Internet has encouraged communication at international level, and allowed operations remotely (i.e., e-commerce, e-banking, etc.). Besides the Internet, there is the mobile network that provides advanced services (i.e., multimedia messaging, Internet access, etc.)"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Biometric identification.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Iris (Eye)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1177222</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |