Skip to Main Content
Iris Biometric Model for Secured Network Access
book

Iris Biometric Model for Secured Network Access

by Franjieh El Khoury
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
5h 23m
English
CRC Press
Content preview from Iris Biometric Model for Secured Network Access
146
IrIs BIometrIC modeL
10. Process AR
10
: the AF_B verifies the received message from
the AF_A:
a. In case the message is not valid (i.e., the type of the mes-
sage sent via the IP address is not defined at the level of the
incoming port of the AF_B), the AF_B informs the AF_A
that the message M is blocked. e AF_A reacts to see the
cause of blocking. It perceives its environment to adjust its
behavior and decides to send the message M again.
b. If not, the AF_A sends the message to the AU_B and
executes the next process.
11. Process AR
11
: the AU_B asks the AK_B to retrieve the pri-
vate key of the receiver to decrypt the encrypted message M.
12. Process AR
12
: the AK_B takes the request and sends the pri-
vate key of the receiver in encr ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
Touchless Fingerprint Biometrics

Touchless Fingerprint Biometrics

Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti

Publisher Resources

ISBN: 9781466502147