Continuous Biometric Authentication Systems (Record no. 87277)

000 -LEADER
fixed length control field 03563nam a22005295i 4500
001 - CONTROL NUMBER
control field 978-3-031-49071-2
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730170919.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240109s2024 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783031490712
-- 978-3-031-49071-2
082 04 - CLASSIFICATION NUMBER
Call Number 006.248
100 1# - AUTHOR NAME
Author Smith-Creasey, Max.
245 10 - TITLE STATEMENT
Title Continuous Biometric Authentication Systems
Sub Title An Overview /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2024.
300 ## - PHYSICAL DESCRIPTION
Number of Pages X, 118 p. 9 illus., 8 illus. in color.
490 1# - SERIES STATEMENT
Series statement SpringerBriefs in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Traditional Authentication -- Continuous Authentication -- Biometrics for Continuous Authentication -- Considerations and Challenges -- Conclusion.
520 ## - SUMMARY, ETC.
Summary, etc This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges. This book brings together a wide variety of key motivations, components and advantages of continuous biometric authentication systems. The overview is kept high level, so as not to limit the scope to any single device, biometric trait, use-case, or scenario. Therefore, the contents of this book are applicable todevices ranging from smartphones to desktop computers, utilising biometrics ranging from face recognition to keystroke dynamics. It also provides metrics from a variety of existing systems such that users can identify the advantages and disadvantages of different approaches. This book targets researchers and lecturers working in authentication, as well as advanced-level students in computer science interested in this field. The book will also be of interest to technical professionals working in cyber security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Law and legislation.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-031-49071-2
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2024.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Biometric identification.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Pattern recognition systems.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Biometrics.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Automated Pattern Recognition.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Privacy.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2191-5776
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS

No items available.