Book description
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgen
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Acknowledgments
- Introduction (1/2)
- Introduction (2/2)
- Chapter 1: Security of Computer Networks (1/2)
- Chapter 1: Security of Computer Networks (2/2)
- Chapter 2: Biometric Systems (1/6)
- Chapter 2: Biometric Systems (2/6)
- Chapter 2: Biometric Systems (3/6)
- Chapter 2: Biometric Systems (4/6)
- Chapter 2: Biometric Systems (5/6)
- Chapter 2: Biometric Systems (6/6)
- Chapter 3: Cryptography (1/2)
- Chapter 3: Cryptography (2/2)
- Chapter 4: Multiagent System (1/5)
- Chapter 4: Multiagent System (2/5)
- Chapter 4: Multiagent System (3/5)
- Chapter 4: Multiagent System (4/5)
- Chapter 4: Multiagent System (5/5)
- Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (1/4)
- Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (2/4)
- Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (3/4)
- Chapter 5: Existing Methods for Localization of External and Internal Edges of the Iris of the Eye (4/4)
- Chapter 6: Existing Methods for Eliminating Effects of the Eyelids (1/2)
- Chapter 6: Existing Methods for Eliminating Effects of the Eyelids (2/2)
- Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (1/5)
- Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (2/5)
- Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (3/5)
- Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (4/5)
- Chapter 7: Biometric Model for Authentication Using the Iris of the Eye (5/5)
- Chapter 8: Global Model Integrating a Multiagent System (1/8)
- Chapter 8: Global Model Integrating a Multiagent System (2/8)
- Chapter 8: Global Model Integrating a Multiagent System (3/8)
- Chapter 8: Global Model Integrating a Multiagent System (4/8)
- Chapter 8: Global Model Integrating a Multiagent System (5/8)
- Chapter 8: Global Model Integrating a Multiagent System (6/8)
- Chapter 8: Global Model Integrating a Multiagent System (7/8)
- Chapter 8: Global Model Integrating a Multiagent System (8/8)
- Chapter 9: Implementation of New Methods (1/2)
- Chapter 9: Implementation of New Methods (2/2)
- Chapter 10: Simulation of Modules (1/2)
- Chapter 10: Simulation of Modules (2/2)
- Chapter 11: Application
- Conclusion and Perspectives
- References (1/2)
- References (2/2)
- Back Cover
Product information
- Title: Iris Biometric Model for Secured Network Access
- Author(s):
- Release date: April 2016
- Publisher(s): CRC Press
- ISBN: 9781466502147
You might also like
book
Foundations of Information Security
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics …
book
Transformational Security Awareness
Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security …
book
Data Center Handbook, 2nd Edition
DATA CENTER HANDBOOK Written by 59 experts and reviewed by a seasoned technical advisory board, the …
book
Take Control of Your Passwords, 3rd Edition
Overcome password frustration with Joe Kissell's expert advice! Version 3.2, updated July 28, 2021 Password overload …