Coverart for item
The Resource Advances in user authentication, Dipankar Dasgupta, Arunava Roy, Abhijit Nag

Advances in user authentication, Dipankar Dasgupta, Arunava Roy, Abhijit Nag

Label
Advances in user authentication
Title
Advances in user authentication
Statement of responsibility
Dipankar Dasgupta, Arunava Roy, Abhijit Nag
Creator
Contributor
Author
Subject
Language
eng
Member of
Cataloging source
YDX
http://library.link/vocab/creatorDate
1958-
http://library.link/vocab/creatorName
Dasgupta, D.
Dewey number
005.8/3
Index
index present
LC call number
QA76.9.A25
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Roy, Arunava
  • Nag, Abhijit
Series statement
  • Infosys Science Foundation series
  • Infosys Science Foundation series. Applied sciences and engineering
http://library.link/vocab/subjectName
  • Computers
  • Computer networks
Label
Advances in user authentication, Dipankar Dasgupta, Arunava Roy, Abhijit Nag
Instantiates
Publication
Copyright
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Preface; Contents; About the Authors; 1 Authentication Basics; Introduction; Types of Authentication Approaches; Type I: What You Know?; Password; PIN Passwords; An Incident Regarding PIN-Based Authentication; Security Questions; Type II: What You Have?; Photo ID; Swipe Card and Smart Card; Security Dongles; CAPTCHA; Type III: What You Are?; Behavioral Attributes; Physiological Attributes; Type IV: Where You Are?; User Account Types; Chapter Summary; Descriptive Questions; Multiple-Choice Questions; References; 2 Biometric Authentication; Introduction; Different Biometric Modalities
  • Biometric Authentication ProcessPerformance Measures of Biometric Systems; False Acceptance Rate (FAR); False Rejection Rate (FRR); Equal Error Rate (EER); Failure to Enroll Rate (FTE); Failure to Acquire Rate (FTA); Details of Biometric Authentication Modalities; Face Recognition; Fingerprint Recognition; Iris Recognition; Retina Recognition; Hand Geometry; Voice (Speaker) Recognition; Keystroke Recognition; Gait-Based Recognition; Passthoughts; Brainprint; Applications of Biometrics; Banking; Computer Access; Immigration; National Identity; Prisons; Telecommunications; Time and Attendance
  • Limitations of Biometric SystemsNew Biometric Challenges; Attacks on Biometric-Based Authentication Systems; Mitigating Different Attacks on Biometric Systems; Liveness Detection Mechanisms; Steganographic and Watermarking Techniques; Challenge-Response Systems; Multimodal Biometric Systems; Soft Biometrics; Cancelable Biometrics; Comparative Evaluation; Chapter Summary; Review Questions; Multiple Choice Questions; References; 3 Negative Authentication Systems; Introduction; Concept of Negative Authentication; Types of NAS; Binary-Valued NAS (B-NAS); Real-Valued NAS (R-NAS)
  • Grid-Based NAS (G-NAS)Implementation of Negative Authentication System (NAS); Hashed String Generation; Confusion Parameter; Detector Coverage; B-NAS Implementation; Experimental Results for B-NAS Implementation; R-NAS Implementation; Experimental Results for R-NAS Implementation; Modification of the Self-region for B-NAS and R-NAS; G-NAS Implementation; Mapping of Self-points to Grid; Experimental Results for G-NAS; Matrix-Based NAS Approach; Comparisons Among Different Approaches of NAS; NAS Architectural Design and Prototype System; Chapter Summary; Review Questions; References
  • 4 Pseudo-Passwords and Non-textual ApproachesEvolution of Hash Functions; Honeyword Approach; Honeychecker; Use of Password Vaults; NLEs from the n-Gram Model Concept; NLEs from the PCFG Model Concept; Encoding or Decoding of the Sub-grammar (SG); Evaluating the Encoders; Evaluating Single Passwords; NoCrack Password Vaults; Bloom Filter; Constructing Bloom Filters; Comparison of Complementary Approaches: NAS (G-NAS, GM-NAS), Honeywords, and Bloom Filter; Non-textual Passwords; Recognition-Based Techniques; Recall-Based Techniques; Security Aspects and Possible Attacks on Graphical Passwords
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9783319588063
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Specific material designation
remote
Label
Advances in user authentication, Dipankar Dasgupta, Arunava Roy, Abhijit Nag
Publication
Copyright
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Preface; Contents; About the Authors; 1 Authentication Basics; Introduction; Types of Authentication Approaches; Type I: What You Know?; Password; PIN Passwords; An Incident Regarding PIN-Based Authentication; Security Questions; Type II: What You Have?; Photo ID; Swipe Card and Smart Card; Security Dongles; CAPTCHA; Type III: What You Are?; Behavioral Attributes; Physiological Attributes; Type IV: Where You Are?; User Account Types; Chapter Summary; Descriptive Questions; Multiple-Choice Questions; References; 2 Biometric Authentication; Introduction; Different Biometric Modalities
  • Biometric Authentication ProcessPerformance Measures of Biometric Systems; False Acceptance Rate (FAR); False Rejection Rate (FRR); Equal Error Rate (EER); Failure to Enroll Rate (FTE); Failure to Acquire Rate (FTA); Details of Biometric Authentication Modalities; Face Recognition; Fingerprint Recognition; Iris Recognition; Retina Recognition; Hand Geometry; Voice (Speaker) Recognition; Keystroke Recognition; Gait-Based Recognition; Passthoughts; Brainprint; Applications of Biometrics; Banking; Computer Access; Immigration; National Identity; Prisons; Telecommunications; Time and Attendance
  • Limitations of Biometric SystemsNew Biometric Challenges; Attacks on Biometric-Based Authentication Systems; Mitigating Different Attacks on Biometric Systems; Liveness Detection Mechanisms; Steganographic and Watermarking Techniques; Challenge-Response Systems; Multimodal Biometric Systems; Soft Biometrics; Cancelable Biometrics; Comparative Evaluation; Chapter Summary; Review Questions; Multiple Choice Questions; References; 3 Negative Authentication Systems; Introduction; Concept of Negative Authentication; Types of NAS; Binary-Valued NAS (B-NAS); Real-Valued NAS (R-NAS)
  • Grid-Based NAS (G-NAS)Implementation of Negative Authentication System (NAS); Hashed String Generation; Confusion Parameter; Detector Coverage; B-NAS Implementation; Experimental Results for B-NAS Implementation; R-NAS Implementation; Experimental Results for R-NAS Implementation; Modification of the Self-region for B-NAS and R-NAS; G-NAS Implementation; Mapping of Self-points to Grid; Experimental Results for G-NAS; Matrix-Based NAS Approach; Comparisons Among Different Approaches of NAS; NAS Architectural Design and Prototype System; Chapter Summary; Review Questions; References
  • 4 Pseudo-Passwords and Non-textual ApproachesEvolution of Hash Functions; Honeyword Approach; Honeychecker; Use of Password Vaults; NLEs from the n-Gram Model Concept; NLEs from the PCFG Model Concept; Encoding or Decoding of the Sub-grammar (SG); Evaluating the Encoders; Evaluating Single Passwords; NoCrack Password Vaults; Bloom Filter; Constructing Bloom Filters; Comparison of Complementary Approaches: NAS (G-NAS, GM-NAS), Honeywords, and Bloom Filter; Non-textual Passwords; Recognition-Based Techniques; Recall-Based Techniques; Security Aspects and Possible Attacks on Graphical Passwords
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9783319588063
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Specific material designation
remote

Library Locations

Processing Feedback ...