Apress Access Memorial Day Sale

Transparent User Authentication

Biometrics, RFID and Behavioural Profiling

By Nathan Clarke

  • eBook Price: $69.99
Buy eBook Buy Print Book
This groundbreaking book introduces and examines the technology required to implement transparent user authentication, in which credentials are captured in the user’s normal interaction with a system. Covers novel behavioural biometrics techniques and more.

Full Description

  • Add to Wishlist
  • ISBN13: 978-0-8572-9804-1
  • 247 Pages
  • User Level: Science
  • Publication Date: August 17, 2011
  • Available eBook Formats: PDF
Full Description
This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and implementation issues of designing point-of-entry authentication, the book introduces and investigates the technological requirements of implementing transparent user authentication – where authentication credentials are captured during a user’s normal interaction with a system. This approach would transform user authentication from a binary point-of-entry decision to a continuous identity confidence measure. Topics and features: discusses the need for user authentication; reviews existing authentication approaches; introduces novel behavioural biometrics techniques; examines the wider system-specific issues with designing large-scale multimodal authentication systems; concludes with a look to the future of user authentication.
Table of Contents

Table of Contents

  1. Part I: Enabling Security through User Authentication.
  2. Current Use of User Authentication.
  3. The Evolving Technological Landscape.
  4. What is Really Being Achieved with User Authentication?
  5. Part II: Authentication Approaches.
  6. Intrusive Authentication Approaches.
  7. Transparent Techniques.
  8. Multibiometrics.
  9. Biometric Standards.
  10. Part III: System Design, Development and Implementation Considerations.
  11. Theoretical Requirements of a Transparent Authentication System.
  12. Implementation Considerations in Ubiquitous Networks.
  13. Evolving Technology and the Future for Authentication.
Errata

Please Login to submit errata.

No errata are currently published