Items related to Continuous Authentication Using Biometrics: Data, Models,...

Continuous Authentication Using Biometrics: Data, Models, and Metrics - Hardcover

 
9781613501290: Continuous Authentication Using Biometrics: Data, Models, and Metrics

Synopsis

User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat. Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the leading experts in this recent, fast growing research area. These chapters collectively provide a thorough and concise introduction to the field of biometric-based continuous authentication. The book covers the conceptual framework underlying continuous authentication and presents detailed processing models for various types of practical continuous authentication applications.

"synopsis" may belong to another edition of this title.

About the Author

Issa Traore obtained a PhD in Software Engineering in 1998 from Institute Nationale Polytechnique (INPT)-LAAS/CNRS, Toulouse, France. He has been with the faculty of the Department of Electrical and Computer Engineering of the University of Victoria since 1999. He is currently an Associate Professor and the Coordinator of the Information Security and Object Technology (ISOT) Lab at the University of Victoria. His research interests include biometrics technologies, computer intrusion detection, network forensics, software security and software quality engineering. He has published over 90 technical papers in computer security and software engineering and supervised 23 Master and PhD graduate students in the last 10 years. He is currently serving as Associate Editor for the International Journal of Communication Networks and Distributed Systems (IJCNDS). Dr. Traore is also a co-founder and CEO of Plurilock Security Solutions Inc., a network security company which provides innovative authentication technologies and is one of the pioneers in bringing continuous authentication products to the market.

Ahmed Awad E. Ahmed is a Senior Scientist at the Electrical and Computer Engineering Department, University of Victoria. He is a member of the Security and Object Technology (ISOT) Research Laboratory at the University of Victoria and the principal investigator of Biotracker, a new intrusion detection system based on biometrics. Dr. Ahmed worked as a Software Design Engineer, Project Manager and Quality Assurance/Security Consultant in a number of leading firms. He is currently the CTO of Plurilock Security Solutions Inc. Dr. Ahmed received his Ph.D. in Electrical and Computer Engineering from the University of Victoria, Victoria, BC, Canada in 2008. His Ph.D. dissertation introduces new trends in security monitoring through human computer interaction devices. Dr. Ahmed completed his BSc and MSc degrees at the Electrical and Computer Engineering Department, Ain Shams University, Cairo, Egypt in 1992 and 1997 respectively.

"About this title" may belong to another edition of this title.

Buy Used

Condition: Fine
A fine copy in pictorial boards...
View this item

US$ 4.49 shipping within U.S.A.

Destination, rates & speeds

Search results for Continuous Authentication Using Biometrics: Data, Models,...

Stock Image

Traore, Issa (Editor), and Ahmed, Ahmed Awad E (Editor);
Published by IGI Global, 2011
ISBN 10: 1613501293 ISBN 13: 9781613501290
Used Hardcover

Seller: The Warm Springs Book Company, Fremont, CA, U.S.A.

Seller rating 4 out of 5 stars 4-star rating, Learn more about seller ratings

Hardcover. Condition: Fine. A fine copy in pictorial boards without a DJ as issued. No statement of printing. Boards have some minor general wear and faint hairline scratches to the boards. Illustrated. A larger book requiring additional postage for international and priority orders. 4to; 296 pages. Seller Inventory # 31944

Contact seller

Buy Used

US$ 89.95
Convert currency
Shipping: US$ 4.49
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Traore, Issa; Ahmed, Awad E. Ahmed
Published by Information Science Reference, 2011
ISBN 10: 1613501293 ISBN 13: 9781613501290
New Hardcover

Seller: Lucky's Textbooks, Dallas, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Seller Inventory # ABLIING23Mar2811580138049

Contact seller

Buy New

US$ 216.33
Convert currency
Shipping: US$ 3.99
Within U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Traore, Issa; Ahmed, Awad E. Ahmed
Published by IGI Global, 2012
ISBN 10: 1613501293 ISBN 13: 9781613501290
New Hardcover
Print on Demand

Seller: PBShop.store US, Wood Dale, IL, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

HRD. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L1-9781613501290

Contact seller

Buy New

US$ 238.23
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Traore, Issa; Ahmed, Awad E. Ahmed
Published by IGI Global, 2012
ISBN 10: 1613501293 ISBN 13: 9781613501290
New Hardcover
Print on Demand

Seller: PBShop.store UK, Fairford, GLOS, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

HRD. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L1-9781613501290

Contact seller

Buy New

US$ 231.68
Convert currency
Shipping: US$ 9.08
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Traore, Issa; Ahmed, Awad E. Ahmed
Published by Information Science Reference, 2011
ISBN 10: 1613501293 ISBN 13: 9781613501290
New Hardcover

Seller: Ria Christie Collections, Uxbridge, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. In. Seller Inventory # ria9781613501290_new

Contact seller

Buy New

US$ 230.03
Convert currency
Shipping: US$ 16.09
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Seller Image

Traore, Issa; Ahmed, Awad E. Ahmed
Published by Information Science Reference, 2011
ISBN 10: 1613501293 ISBN 13: 9781613501290
New Hardcover
Print on Demand

Seller: moluna, Greven, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Gebunden. Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. KlappentextrnrnUser authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed stati. Seller Inventory # 4246504

Contact seller

Buy New

US$ 251.71
Convert currency
Shipping: US$ 56.90
From Germany to U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Seller Image

Issa Traore
Published by Information Science Reference, 2011
ISBN 10: 1613501293 ISBN 13: 9781613501290
New Hardcover
Print on Demand

Seller: AHA-BUCH GmbH, Einbeck, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Buch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat. Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the leading experts in this recent, fast growing research area. These chapters collectively provide a thorough and concise introduction to the field of biometric-based continuous authentication. The book covers the conceptual framework underlying continuous authentication and presents detailed processing models for various types of practical continuous authentication applications. Seller Inventory # 9781613501290

Contact seller

Buy New

US$ 314.16
Convert currency
Shipping: US$ 38.38
From Germany to U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket