000 02079nam a2200361Ia 4500
001 CRC0KE15877PDF
003 FlBoTFG
005 20230512170701.0
006 m o d
007 cr cn
008 130619s2013 fluad ob 001 0 eng d
020 _a9780429067198
035 _a(OCoLC)841809646
040 _aFlBoTFG
_cFlBoTFG
082 _a005.8
_bK458
090 _aTK7882.B56
_bK46 2013
100 1 _aKhoury, Franjieh El.
245 1 0 _aIris Biometric Model for Secured Network Access
260 _aBoca Raton :
_bCRC Press,
_cc2013.
300 _a220 p. :
504 _aIncludes bibliographical references and index.
505 0 _apt. 1. State of the art -- pt. 2. Critical analysis of methods of iris recognition -- pt. 3. Our proposed model : the iris crypto agent system -- pt. 4. Implementation and simulations.
520 _aThe rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one hand the transition from a centralized to a decentralized system distributed locally or remotely, has facilitated the tasks in various sectors (i.e., educational, social, government, commercial, etc.). On the other hand, the integration of the Internet has encouraged communication at international level, and allowed operations remotely (i.e., e-commerce, e-banking, etc.). Besides the Internet, there is the mobile network that provides advanced services (i.e., multimedia messaging, Internet access, etc.)--
_cProvided by publisher.
530 _aAlso available in print edition.
538 _aMode of access: World Wide Web.
650 0 _aBiometric identification.
650 0 _aIris (Eye)
650 0 _aComputer networks
_xSecurity measures.
655 7 _aElectronic books.
776 1 _z9781466502130 (hardback)
856 4 0 _uhttp://marc.crcnetbase.com/isbn/9781466502147
_qebook
942 _2ddc
_cEBK
999 _c1036
_d1036