- Full Description
This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and implementation issues of designing point-of-entry authentication, the book introduces and investigates the technological requirements of implementing transparent user authentication – where authentication credentials are captured during a user’s normal interaction with a system. This approach would transform user authentication from a binary point-of-entry decision to a continuous identity confidence measure. Topics and features: discusses the need for user authentication; reviews existing authentication approaches; introduces novel behavioural biometrics techniques; examines the wider system-specific issues with designing large-scale multimodal authentication systems; concludes with a look to the future of user authentication.
- Table of Contents
Table of Contents
- Part I: Enabling Security through User Authentication.
- Current Use of User Authentication.
- The Evolving Technological Landscape.
- What is Really Being Achieved with User Authentication?
- Part II: Authentication Approaches.
- Intrusive Authentication Approaches.
- Transparent Techniques.
- Biometric Standards.
- Part III: System Design, Development and Implementation Considerations.
- Theoretical Requirements of a Transparent Authentication System.
- Implementation Considerations in Ubiquitous Networks.
- Evolving Technology and the Future for Authentication.
If you think that you've found an error in this book, please let us know by emailing to email@example.com . You will find any confirmed erratum below, so you can check if your concern has already been addressed. No errata are currently published