Skip to Main Content
Iris Biometric Model for Secured Network Access
book

Iris Biometric Model for Secured Network Access

by Franjieh El Khoury
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
5h 23m
English
CRC Press
Content preview from Iris Biometric Model for Secured Network Access
6
IrIs BIometrIC modeL
1.3.2 Means of Defense at the Level of Data and eir
Transmission across the Network
is section presents various techniques and protocols that protect
data or private information transmitted over a network. ese tech-
niques are data encryption, the IPSec protocol, and the SSL protocol.
1.3.2.1 Data Encryption According to William Stallings (1999),
cryptography aims to be able to transmit information in a secure
manner based on a sequence of operations:
e sender encrypts its message according to a process estab-
lished by the receiver or by itself.
e message is sent via any transmission.
e receiver decrypts the message using the reverse process.
e data encryption function is to ensure the security of access to ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
Touchless Fingerprint Biometrics

Touchless Fingerprint Biometrics

Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti

Publisher Resources

ISBN: 9781466502147