Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS

Linked e-resources

Details

Preface; Contents; About the Authors; 1 Authentication Basics; Introduction; Types of Authentication Approaches; Type I: What You Know?; Password; PIN Passwords; An Incident Regarding PIN-Based Authentication; Security Questions; Type II: What You Have?; Photo ID; Swipe Card and Smart Card; Security Dongles; CAPTCHA; Type III: What You Are?; Behavioral Attributes; Physiological Attributes; Type IV: Where You Are?; User Account Types; Chapter Summary; Descriptive Questions; Multiple-Choice Questions; References; 2 Biometric Authentication; Introduction; Different Biometric Modalities

Biometric Authentication ProcessPerformance Measures of Biometric Systems; False Acceptance Rate (FAR); False Rejection Rate (FRR); Equal Error Rate (EER); Failure to Enroll Rate (FTE); Failure to Acquire Rate (FTA); Details of Biometric Authentication Modalities; Face Recognition; Fingerprint Recognition; Iris Recognition; Retina Recognition; Hand Geometry; Voice (Speaker) Recognition; Keystroke Recognition; Gait-Based Recognition; Passthoughts; Brainprint; Applications of Biometrics; Banking; Computer Access; Immigration; National Identity; Prisons; Telecommunications; Time and Attendance

Limitations of Biometric SystemsNew Biometric Challenges; Attacks on Biometric-Based Authentication Systems; Mitigating Different Attacks on Biometric Systems; Liveness Detection Mechanisms; Steganographic and Watermarking Techniques; Challenge-Response Systems; Multimodal Biometric Systems; Soft Biometrics; Cancelable Biometrics; Comparative Evaluation; Chapter Summary; Review Questions; Multiple Choice Questions; References; 3 Negative Authentication Systems; Introduction; Concept of Negative Authentication; Types of NAS; Binary-Valued NAS (B-NAS); Real-Valued NAS (R-NAS)

Grid-Based NAS (G-NAS)Implementation of Negative Authentication System (NAS); Hashed String Generation; Confusion Parameter; Detector Coverage; B-NAS Implementation; Experimental Results for B-NAS Implementation; R-NAS Implementation; Experimental Results for R-NAS Implementation; Modification of the Self-region for B-NAS and R-NAS; G-NAS Implementation; Mapping of Self-points to Grid; Experimental Results for G-NAS; Matrix-Based NAS Approach; Comparisons Among Different Approaches of NAS; NAS Architectural Design and Prototype System; Chapter Summary; Review Questions; References

4 Pseudo-Passwords and Non-textual ApproachesEvolution of Hash Functions; Honeyword Approach; Honeychecker; Use of Password Vaults; NLEs from the n-Gram Model Concept; NLEs from the PCFG Model Concept; Encoding or Decoding of the Sub-grammar (SG); Evaluating the Encoders; Evaluating Single Passwords; NoCrack Password Vaults; Bloom Filter; Constructing Bloom Filters; Comparison of Complementary Approaches: NAS (G-NAS, GM-NAS), Honeywords, and Bloom Filter; Non-textual Passwords; Recognition-Based Techniques; Recall-Based Techniques; Security Aspects and Possible Attacks on Graphical Passwords

Browse Subjects

Show more subjects...

Statistics

from
to
Export