Reference Hub22
Indices1
Continuous Authentication Using Biometrics: Data, Models, and Metrics

Continuous Authentication Using Biometrics: Data, Models, and Metrics

Copyright: © 2012 |Pages: 294
ISBN13: 9781613501290|ISBN10: 1613501293|EISBN13: 9781613501306
DOI: 10.4018/978-1-61350-129-0
Cite Book Cite Book

MLA

Traore, Issa, and Ahmed Awad E. Ahmed, editors. Continuous Authentication Using Biometrics: Data, Models, and Metrics. IGI Global, 2012. https://doi.org/10.4018/978-1-61350-129-0

APA

Traore, I. & Ahmed, A. (Eds.). (2012). Continuous Authentication Using Biometrics: Data, Models, and Metrics. IGI Global. https://doi.org/10.4018/978-1-61350-129-0

Chicago

Traore, Issa, and Ahmed Awad E. Ahmed, eds. Continuous Authentication Using Biometrics: Data, Models, and Metrics. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-61350-129-0

Export Reference

Mendeley
Favorite Full-Book Download

User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat.

Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the leading experts in this recent, fast growing research area. These chapters collectively provide a thorough and concise introduction to the field of biometric-based continuous authentication. The book covers the conceptual framework underlying continuous authentication and presents detailed processing models for various types of practical continuous authentication applications.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Fundamentals  (pages 13-14)
Fundamentals
This content has been removed at the discretion of the publisher and the editors.
Continuous Authentication Based on Physiological and Cognitive Biometrics
This content has been removed at the discretion of the publisher and the editors.
Continuous Authentication Using Behavioural Biometrics
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.