Skip to Main Content
Iris Biometric Model for Secured Network Access
book

Iris Biometric Model for Secured Network Access

by Franjieh El Khoury
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
5h 23m
English
CRC Press
Content preview from Iris Biometric Model for Secured Network Access
151
modeL IntegratIng a muLtIagent system
T
3
: priority 3—the AU_A asks the AF_A to retrieve the public
key of the receiver to encrypt the clear message.
T
4
: priority 4—in case the request of the public key of the
receiver is blocked by the AF_A, the AU_A reacts to see the
cause of blocking. It perceives from its environment to adjust
its behavior and decides to send the request again.
T
5
: priority 5—the AU_A takes from the AF_A the message
sent by the AAS. In case the message is not empty, the AU_A
asks the AK_A to retrieve the private key to decrypt the pub-
lic key of the receiver.
ese tasks will be performed consecutively according to their priority.
8.3.5.2.4 Tasks of Agent User Side B e tasks T
i
(i = 1, . . . , 3) of the
AU_B have different ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
Touchless Fingerprint Biometrics

Touchless Fingerprint Biometrics

Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti

Publisher Resources

ISBN: 9781466502147