The Resource Advances in user authentication, Dipankar Dasgupta, Arunava Roy, Abhijit Nag
Advances in user authentication, Dipankar Dasgupta, Arunava Roy, Abhijit Nag
Resource Information
The item Advances in user authentication, Dipankar Dasgupta, Arunava Roy, Abhijit Nag represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Liverpool.This item is available to borrow from 1 library branch.
Resource Information
The item Advances in user authentication, Dipankar Dasgupta, Arunava Roy, Abhijit Nag represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Liverpool.
This item is available to borrow from 1 library branch.
- Language
- eng
- Extent
- 1 online resource.
- Contents
-
- Preface; Contents; About the Authors; 1 Authentication Basics; Introduction; Types of Authentication Approaches; Type I: What You Know?; Password; PIN Passwords; An Incident Regarding PIN-Based Authentication; Security Questions; Type II: What You Have?; Photo ID; Swipe Card and Smart Card; Security Dongles; CAPTCHA; Type III: What You Are?; Behavioral Attributes; Physiological Attributes; Type IV: Where You Are?; User Account Types; Chapter Summary; Descriptive Questions; Multiple-Choice Questions; References; 2 Biometric Authentication; Introduction; Different Biometric Modalities
- Biometric Authentication ProcessPerformance Measures of Biometric Systems; False Acceptance Rate (FAR); False Rejection Rate (FRR); Equal Error Rate (EER); Failure to Enroll Rate (FTE); Failure to Acquire Rate (FTA); Details of Biometric Authentication Modalities; Face Recognition; Fingerprint Recognition; Iris Recognition; Retina Recognition; Hand Geometry; Voice (Speaker) Recognition; Keystroke Recognition; Gait-Based Recognition; Passthoughts; Brainprint; Applications of Biometrics; Banking; Computer Access; Immigration; National Identity; Prisons; Telecommunications; Time and Attendance
- Limitations of Biometric SystemsNew Biometric Challenges; Attacks on Biometric-Based Authentication Systems; Mitigating Different Attacks on Biometric Systems; Liveness Detection Mechanisms; Steganographic and Watermarking Techniques; Challenge-Response Systems; Multimodal Biometric Systems; Soft Biometrics; Cancelable Biometrics; Comparative Evaluation; Chapter Summary; Review Questions; Multiple Choice Questions; References; 3 Negative Authentication Systems; Introduction; Concept of Negative Authentication; Types of NAS; Binary-Valued NAS (B-NAS); Real-Valued NAS (R-NAS)
- Grid-Based NAS (G-NAS)Implementation of Negative Authentication System (NAS); Hashed String Generation; Confusion Parameter; Detector Coverage; B-NAS Implementation; Experimental Results for B-NAS Implementation; R-NAS Implementation; Experimental Results for R-NAS Implementation; Modification of the Self-region for B-NAS and R-NAS; G-NAS Implementation; Mapping of Self-points to Grid; Experimental Results for G-NAS; Matrix-Based NAS Approach; Comparisons Among Different Approaches of NAS; NAS Architectural Design and Prototype System; Chapter Summary; Review Questions; References
- 4 Pseudo-Passwords and Non-textual ApproachesEvolution of Hash Functions; Honeyword Approach; Honeychecker; Use of Password Vaults; NLEs from the n-Gram Model Concept; NLEs from the PCFG Model Concept; Encoding or Decoding of the Sub-grammar (SG); Evaluating the Encoders; Evaluating Single Passwords; NoCrack Password Vaults; Bloom Filter; Constructing Bloom Filters; Comparison of Complementary Approaches: NAS (G-NAS, GM-NAS), Honeywords, and Bloom Filter; Non-textual Passwords; Recognition-Based Techniques; Recall-Based Techniques; Security Aspects and Possible Attacks on Graphical Passwords
- Isbn
- 9783319588063
- Label
- Advances in user authentication
- Title
- Advances in user authentication
- Statement of responsibility
- Dipankar Dasgupta, Arunava Roy, Abhijit Nag
- Language
- eng
- Cataloging source
- YDX
- http://library.link/vocab/creatorDate
- 1958-
- http://library.link/vocab/creatorName
- Dasgupta, D.
- Dewey number
- 005.8/3
- Index
- index present
- LC call number
- QA76.9.A25
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
-
- Roy, Arunava
- Nag, Abhijit
- Series statement
-
- Infosys Science Foundation series
- Infosys Science Foundation series. Applied sciences and engineering
- http://library.link/vocab/subjectName
-
- Computers
- Computer networks
- Label
- Advances in user authentication, Dipankar Dasgupta, Arunava Roy, Abhijit Nag
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Preface; Contents; About the Authors; 1 Authentication Basics; Introduction; Types of Authentication Approaches; Type I: What You Know?; Password; PIN Passwords; An Incident Regarding PIN-Based Authentication; Security Questions; Type II: What You Have?; Photo ID; Swipe Card and Smart Card; Security Dongles; CAPTCHA; Type III: What You Are?; Behavioral Attributes; Physiological Attributes; Type IV: Where You Are?; User Account Types; Chapter Summary; Descriptive Questions; Multiple-Choice Questions; References; 2 Biometric Authentication; Introduction; Different Biometric Modalities
- Biometric Authentication ProcessPerformance Measures of Biometric Systems; False Acceptance Rate (FAR); False Rejection Rate (FRR); Equal Error Rate (EER); Failure to Enroll Rate (FTE); Failure to Acquire Rate (FTA); Details of Biometric Authentication Modalities; Face Recognition; Fingerprint Recognition; Iris Recognition; Retina Recognition; Hand Geometry; Voice (Speaker) Recognition; Keystroke Recognition; Gait-Based Recognition; Passthoughts; Brainprint; Applications of Biometrics; Banking; Computer Access; Immigration; National Identity; Prisons; Telecommunications; Time and Attendance
- Limitations of Biometric SystemsNew Biometric Challenges; Attacks on Biometric-Based Authentication Systems; Mitigating Different Attacks on Biometric Systems; Liveness Detection Mechanisms; Steganographic and Watermarking Techniques; Challenge-Response Systems; Multimodal Biometric Systems; Soft Biometrics; Cancelable Biometrics; Comparative Evaluation; Chapter Summary; Review Questions; Multiple Choice Questions; References; 3 Negative Authentication Systems; Introduction; Concept of Negative Authentication; Types of NAS; Binary-Valued NAS (B-NAS); Real-Valued NAS (R-NAS)
- Grid-Based NAS (G-NAS)Implementation of Negative Authentication System (NAS); Hashed String Generation; Confusion Parameter; Detector Coverage; B-NAS Implementation; Experimental Results for B-NAS Implementation; R-NAS Implementation; Experimental Results for R-NAS Implementation; Modification of the Self-region for B-NAS and R-NAS; G-NAS Implementation; Mapping of Self-points to Grid; Experimental Results for G-NAS; Matrix-Based NAS Approach; Comparisons Among Different Approaches of NAS; NAS Architectural Design and Prototype System; Chapter Summary; Review Questions; References
- 4 Pseudo-Passwords and Non-textual ApproachesEvolution of Hash Functions; Honeyword Approach; Honeychecker; Use of Password Vaults; NLEs from the n-Gram Model Concept; NLEs from the PCFG Model Concept; Encoding or Decoding of the Sub-grammar (SG); Evaluating the Encoders; Evaluating Single Passwords; NoCrack Password Vaults; Bloom Filter; Constructing Bloom Filters; Comparison of Complementary Approaches: NAS (G-NAS, GM-NAS), Honeywords, and Bloom Filter; Non-textual Passwords; Recognition-Based Techniques; Recall-Based Techniques; Security Aspects and Possible Attacks on Graphical Passwords
- Dimensions
- unknown
- Extent
- 1 online resource.
- Form of item
- online
- Isbn
- 9783319588063
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Specific material designation
- remote
- Label
- Advances in user authentication, Dipankar Dasgupta, Arunava Roy, Abhijit Nag
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Preface; Contents; About the Authors; 1 Authentication Basics; Introduction; Types of Authentication Approaches; Type I: What You Know?; Password; PIN Passwords; An Incident Regarding PIN-Based Authentication; Security Questions; Type II: What You Have?; Photo ID; Swipe Card and Smart Card; Security Dongles; CAPTCHA; Type III: What You Are?; Behavioral Attributes; Physiological Attributes; Type IV: Where You Are?; User Account Types; Chapter Summary; Descriptive Questions; Multiple-Choice Questions; References; 2 Biometric Authentication; Introduction; Different Biometric Modalities
- Biometric Authentication ProcessPerformance Measures of Biometric Systems; False Acceptance Rate (FAR); False Rejection Rate (FRR); Equal Error Rate (EER); Failure to Enroll Rate (FTE); Failure to Acquire Rate (FTA); Details of Biometric Authentication Modalities; Face Recognition; Fingerprint Recognition; Iris Recognition; Retina Recognition; Hand Geometry; Voice (Speaker) Recognition; Keystroke Recognition; Gait-Based Recognition; Passthoughts; Brainprint; Applications of Biometrics; Banking; Computer Access; Immigration; National Identity; Prisons; Telecommunications; Time and Attendance
- Limitations of Biometric SystemsNew Biometric Challenges; Attacks on Biometric-Based Authentication Systems; Mitigating Different Attacks on Biometric Systems; Liveness Detection Mechanisms; Steganographic and Watermarking Techniques; Challenge-Response Systems; Multimodal Biometric Systems; Soft Biometrics; Cancelable Biometrics; Comparative Evaluation; Chapter Summary; Review Questions; Multiple Choice Questions; References; 3 Negative Authentication Systems; Introduction; Concept of Negative Authentication; Types of NAS; Binary-Valued NAS (B-NAS); Real-Valued NAS (R-NAS)
- Grid-Based NAS (G-NAS)Implementation of Negative Authentication System (NAS); Hashed String Generation; Confusion Parameter; Detector Coverage; B-NAS Implementation; Experimental Results for B-NAS Implementation; R-NAS Implementation; Experimental Results for R-NAS Implementation; Modification of the Self-region for B-NAS and R-NAS; G-NAS Implementation; Mapping of Self-points to Grid; Experimental Results for G-NAS; Matrix-Based NAS Approach; Comparisons Among Different Approaches of NAS; NAS Architectural Design and Prototype System; Chapter Summary; Review Questions; References
- 4 Pseudo-Passwords and Non-textual ApproachesEvolution of Hash Functions; Honeyword Approach; Honeychecker; Use of Password Vaults; NLEs from the n-Gram Model Concept; NLEs from the PCFG Model Concept; Encoding or Decoding of the Sub-grammar (SG); Evaluating the Encoders; Evaluating Single Passwords; NoCrack Password Vaults; Bloom Filter; Constructing Bloom Filters; Comparison of Complementary Approaches: NAS (G-NAS, GM-NAS), Honeywords, and Bloom Filter; Non-textual Passwords; Recognition-Based Techniques; Recall-Based Techniques; Security Aspects and Possible Attacks on Graphical Passwords
- Dimensions
- unknown
- Extent
- 1 online resource.
- Form of item
- online
- Isbn
- 9783319588063
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Specific material designation
- remote
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/Advances-in-user-authentication-Dipankar/o-4vKqri8LI/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/Advances-in-user-authentication-Dipankar/o-4vKqri8LI/">Advances in user authentication, Dipankar Dasgupta, Arunava Roy, Abhijit Nag</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Advances in user authentication, Dipankar Dasgupta, Arunava Roy, Abhijit Nag
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/Advances-in-user-authentication-Dipankar/o-4vKqri8LI/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/Advances-in-user-authentication-Dipankar/o-4vKqri8LI/">Advances in user authentication, Dipankar Dasgupta, Arunava Roy, Abhijit Nag</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>