Skip to Main Content
Iris Biometric Model for Secured Network Access
book

Iris Biometric Model for Secured Network Access

by Franjieh El Khoury
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
5h 23m
English
CRC Press
Content preview from Iris Biometric Model for Secured Network Access
136
IrIs BIometrIC modeL
in an encrypted message M. It also interacts with the AF_A to send
the message M to AU_B. In case of warning of blocking, it reacts to
see the cause of this blocking. It perceives its environment to adjust its
behavior. It decides to send the request again. Figure8.9 shows the
class of the user agent side A.
8.3.3.4 Agent User Side B e agent user (AU_B) is located at the user
system side B. It takes the encrypted message M from the AF_B.
It interacts with the AK_B to find the private key of the receiver
to decrypt the message M. It also interacts with the AK_B to find
the private key to decrypt the private key of the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
Touchless Fingerprint Biometrics

Touchless Fingerprint Biometrics

Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti

Publisher Resources

ISBN: 9781466502147