Iris biometric model for secured network access / Franjieh El Khoury.

"The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the...

Full description

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2013
Language:English
Online Access:
Physical Description:xvii, 194 p. :; ill.
Notes:"An Auerbach book."
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5001177222
ctrlnum (MiAaPQ)5001177222
(Au-PeEL)EBL1177222
(CaPaEBR)ebr10691559
(CaONFJC)MIL502287
(OCoLC)841809646
collection bib_alma
record_format marc
spelling Khoury, Franjieh El.
Iris biometric model for secured network access [electronic resource] / Franjieh El Khoury.
Boca Raton : CRC Press, 2013.
xvii, 194 p. : ill.
"An Auerbach book."
Includes bibliographical references and index.
pt. 1. State of the art -- pt. 2. Critical analysis of methods of iris recognition -- pt. 3. Our proposed model : the iris crypto agent system -- pt. 4. Implementation and simulations.
"The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one hand the transition from a centralized to a decentralized system distributed locally or remotely, has facilitated the tasks in various sectors (i.e., educational, social, government, commercial, etc.). On the other hand, the integration of the Internet has encouraged communication at international level, and allowed operations remotely (i.e., e-commerce, e-banking, etc.). Besides the Internet, there is the mobile network that provides advanced services (i.e., multimedia messaging, Internet access, etc.)"-- Provided by publisher.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Biometric identification.
Iris (Eye)
Computer networks Security measures.
Electronic books.
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1177222 Click to View
language English
format Electronic
eBook
author Khoury, Franjieh El.
spellingShingle Khoury, Franjieh El.
Iris biometric model for secured network access
pt. 1. State of the art -- pt. 2. Critical analysis of methods of iris recognition -- pt. 3. Our proposed model : the iris crypto agent system -- pt. 4. Implementation and simulations.
author_facet Khoury, Franjieh El.
ProQuest (Firm)
ProQuest (Firm)
author_variant f e k fe fek
author2 ProQuest (Firm)
author2_role TeilnehmendeR
author_corporate ProQuest (Firm)
author_sort Khoury, Franjieh El.
title Iris biometric model for secured network access
title_full Iris biometric model for secured network access [electronic resource] / Franjieh El Khoury.
title_fullStr Iris biometric model for secured network access [electronic resource] / Franjieh El Khoury.
title_full_unstemmed Iris biometric model for secured network access [electronic resource] / Franjieh El Khoury.
title_auth Iris biometric model for secured network access
title_new Iris biometric model for secured network access
title_sort iris biometric model for secured network access
publisher CRC Press,
publishDate 2013
physical xvii, 194 p. : ill.
contents pt. 1. State of the art -- pt. 2. Critical analysis of methods of iris recognition -- pt. 3. Our proposed model : the iris crypto agent system -- pt. 4. Implementation and simulations.
isbn 9781466502147 (electronic bk.)
callnumber-first T - Technology
callnumber-subject TK - Electrical and Nuclear Engineering
callnumber-label TK7882
callnumber-sort TK 47882 B56 K46 42013
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1177222
illustrated Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
oclc_num 841809646
work_keys_str_mv AT khouryfranjiehel irisbiometricmodelforsecurednetworkaccess
AT proquestfirm irisbiometricmodelforsecurednetworkaccess
status_str n
ids_txt_mv (MiAaPQ)5001177222
(Au-PeEL)EBL1177222
(CaPaEBR)ebr10691559
(CaONFJC)MIL502287
(OCoLC)841809646
is_hierarchy_title Iris biometric model for secured network access
author2_original_writing_str_mv noLinkedField
_version_ 1792330750466457600
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02439nam a2200409 a 4500</leader><controlfield tag="001">5001177222</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">130321s2013 fluad sb 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2012051055</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781466502130 (hardback)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466502147 (electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5001177222</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL1177222</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10691559</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL502287</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)841809646</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK7882.B56</subfield><subfield code="b">K46 2013</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Khoury, Franjieh El.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Iris biometric model for secured network access</subfield><subfield code="h">[electronic resource] /</subfield><subfield code="c">Franjieh El Khoury.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Boca Raton :</subfield><subfield code="b">CRC Press,</subfield><subfield code="c">2013.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvii, 194 p. :</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"An Auerbach book."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">pt. 1. State of the art -- pt. 2. Critical analysis of methods of iris recognition -- pt. 3. Our proposed model : the iris crypto agent system -- pt. 4. Implementation and simulations.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one hand the transition from a centralized to a decentralized system distributed locally or remotely, has facilitated the tasks in various sectors (i.e., educational, social, government, commercial, etc.). On the other hand, the integration of the Internet has encouraged communication at international level, and allowed operations remotely (i.e., e-commerce, e-banking, etc.). Besides the Internet, there is the mobile network that provides advanced services (i.e., multimedia messaging, Internet access, etc.)"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Biometric identification.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Iris (Eye)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1177222</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>