Behavioral biometrics : a remote access approach /
With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an auth...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Chichester, UK :
John Wiley & Sons,
2008.
|
Subjects: | |
Online Access: | CONNECT |
MARC
LEADER | 00000nam a2200000 a 4500 | ||
---|---|---|---|
001 | in00006107006 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 090122s2008 enka ob 001 0 eng d | ||
005 | 20240125144107.7 | ||
020 | |a 9780470997949 | ||
020 | |a 047099794X | ||
020 | |a 9780470997932 |q (electronic bk.) | ||
020 | |a 0470997931 |q (electronic bk.) | ||
020 | |a 9780470518830 |q (hbk.) | ||
020 | |a 0470518839 |q (hbk.) | ||
020 | |a 1281841366 | ||
020 | |a 9781281841360 | ||
020 | |a 9786611841362 | ||
020 | |a 6611841369 | ||
024 | 7 | |a 10.1002/9780470997949 |2 doi | |
035 | |a (NhCcYBP)e80fa363d91f485b9a695405a0a7a4bb9780470997949 | ||
035 | |a 1wileyeba9780470997949 | ||
037 | |a 10.1002/9780470997949 |b Wiley InterScience |n http://www3.interscience.wiley.com | ||
040 | |a NhCcYBP |b eng |c NhCcYBP | ||
050 | 4 | |a TK7882.B56 |b R48 2008eb | |
082 | 0 | 4 | |a 006.4 |2 22 |
100 | 1 | |a Revett, Kenneth. | |
245 | 1 | 0 | |a Behavioral biometrics : |b a remote access approach / |c Kenneth Revett. |
260 | |a Chichester, UK : |b John Wiley & Sons, |c 2008. | ||
300 | |a 1 online resource (vi, 244 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Wiley EBA |5 TMurS | ||
504 | |a Includes bibliographical references (pages 229-240) and index. | ||
505 | 0 | |a Behavioral Biometrics; Contents; 1: Introduction to Behavioral Biometrics; 2: Voice Identification; 3: Signature Verification; 4: Keystroke Dynamics; 5: Graphical-Based Authentication Methods; 6: Mouse Dynamics; 7: Multimodal Biometric Systems; 8: The Future of Behavioral Biometrics; Appendix; References; Index. | |
520 | |a With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need for a small footprint, versatile alternative to expensive hardware-based, or physiological, biometrics. As an emerging alternative to these traditional and more well-known physiological biometrics such as fingerprinting or iris scans, behavorial biometric. | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Biometric identification. | |
650 | 0 | |a Biometric identification |x Data processing. | |
730 | 0 | |a WILEYEBA | |
776 | 0 | 8 | |i Print version: |a Revett, Kenneth. |t Behavioral biometrics. |d Chichester, UK : John Wiley & Sons, 2008 |z 0470518839 |z 9780470518830 |w (DLC) 2008024097 |
856 | 4 | 0 | |u https://ezproxy.mtsu.edu/login?url=https://onlinelibrary.wiley.com/book/10.1002/9780470997949 |z CONNECT |3 Wiley |t 0 |
949 | |a ho0 | ||
975 | |p Wiley UBCM Online Book All Titles thru 2023 | ||
976 | |a 6006612 | ||
998 | |a wi |d z | ||
999 | f | f | |s f1b44e4b-bfd3-43ff-8579-1c6883e4e438 |i f1b44e4b-bfd3-43ff-8579-1c6883e4e438 |t 0 |
952 | f | f | |a Middle Tennessee State University |b Main |c James E. Walker Library |d Electronic Resources |t 0 |e TK7882.B56 R48 2008eb |h Library of Congress classification |