Part I: Enabling Security through User Authentication
Current Use of User Authentication
The Evolving Technological Landscape
What is Really Being Achieved with User Authentication?
Part II: Authentication Approaches
Intrusive Authentication Approaches
Transparent Techniques
Multibiometrics
Biometric Standards
Part III: System Design, Development and Implementation Considerations
Theoretical Requirements of a Transparent Authentication System
Implementation Considerations in Ubiquitous Networks
Evolving Technology and the Future for Authentication
We publiceren alleen reviews die voldoen aan de voorwaarden voor reviews. Bekijk onze voorwaarden voor reviews.