eBooks-it.org Logo
eBooks-IT.org Inner Image

Iris Biometric Model for Secured Network Access

Iris Biometric Model for Secured Network Access Image

Book Details:

Publisher:CRC Press
Series: CRC Press
Author:Franjieh El Khoury
Edition:1
ISBN-10:1466502134
ISBN-13:9781466502130
Pages:220
Published:May 08 2013
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:7.12 MB

Book Description:

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgentSystem (ICAS), which is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using "Rivest-Shamir-Adleman" (RSA) in an agent-based architecture. It focuses on the development of new methods in biometric authentication in order to provide greater efficiency in the ICAS model. It also covers the pretopological aspects in the development of the indexed hierarchy to classify DRVA iris templates. The book introduces biometric systems, cryptography, and multi-agent systems (MAS) and explains how they can be used to solve security problems in complex systems. Examining the growing interest to exploit MAS across a range of fields through the integration of various features of agents, it also explains how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access. The book presents the various conventional methods for the localization of external and internal edges of the iris of the eye based on five simulations and details the effectiveness of each. It also improves upon existing methods for the localization of the external and internal edges of the iris and for removing the intrusive effects of the eyelids.

Download Link:

Related Books:

CERT Resilience Management Model

A Maturity Model for Managing Operational Resilience
CERT Resilience Management Model Image
CERT Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments. CERT-RMM distills years of research into best practices for managing the security and survivability of people, information, technology, and facilities. It integrates these best practices into a unified, capability-focused maturity model that encompasses security, business continuity, and IT operations. By using CERT-RMM, organizations can escape silo-driven approaches to managing operational risk and align to achieve strategic resilience management goals. This book both introduces CERT-RMM and presents the model in its entirety. It begins with essential background for all professionals, whether ...

SAS/ACCESS 9.1 Supplement for SYBASE

SAS/ACCESS For Relational Databases
SAS/ACCESS 9.1 Supplement for SYBASE Image
This supplement describes the SAS/ACCESS features and options that are available for SYBASE. When you use this supplement along with SAS/ACCESS Interface to Relational Databases: Reference, you will have a comprehensive guide to SAS/ACCESS software for your database management system (DBMS). This supplement explains how SAS/ACCESS software has been customized to accommodate the particular requirements and capabilities of your DBMS. This title is also available online. This title is designed for users of SAS/ACCESS software who need specific information about SYBASE. Supports releases 9.1 and higher of SAS software....

Windows Server 2008 Networking and Network Access Protection

Windows Server 2008 Networking and Network Access Protection Image
Get the official resource for deploying, administering, and troubleshooting Windows Server 2008 networking and Network Access Protection (NAP) technologies, direct from the experts who know the technologies best. This definitive resource from award-winning Microsoft networking author Joseph Davies and Microsoft Most Valuable Professional (MVP) author Tony Northrup also offers expert insights direct from the Windows Server Networking team at Microsoft. You get detailed information about all major networking and network security services, including the all-new Network Access Protection (NAP), authentication infrastructure, IPv4 and IPv6, remote access, virtual private networks, IP security, quality of service, scalable networking, wireless infrastructu...



2007 - 2021 © eBooks-IT.org