| 000 | 03045nam a2200397 i 4500 | ||
|---|---|---|---|
| 005 | 20250918233746.0 | ||
| 008 | 140331s2013 flua b 001 0 eng | ||
| 020 |
_a9781466502130 (hbk.) _cRM393.95 |
||
| 020 | _a1466502134 (hbk.) | ||
| 039 | 9 |
_a201405201121 _brosli _c201405150923 _dhamudah _y03-31-2014 _zhamudah |
|
| 040 |
_aDLC _beng _erda _cDLC _dBTCTA _dUKMGB _dYDXCP _dOCLCO _dBWX _dCDX _dOCLCF _dNJI _dUKM |
||
| 090 | _aTK7882.B56K536 | ||
| 090 |
_aTK7882.B56 _bK536 |
||
| 100 | 1 | _aKhoury, Franjieh El. | |
| 245 | 1 | 0 |
_aIris biometric model for secured network access / _cFranjieh El Khoury. |
| 264 | 1 |
_aBoca Raton : _bCRC Press, _c[2013]. |
|
| 300 |
_axvii, 204 pages : _billustrations ; _c24 cm. |
||
| 336 |
_atext _2rdacontent |
||
| 337 |
_aunmediated _2rdamedia |
||
| 338 |
_avolume _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aPart 1: State of the art -- Security of computer networks -- Biometric systems -- Cryptography -- Multiagent system -- Part 2: Critical analysis of methods of iris recognition -- Existing methods for localization of external and internal edges of the iris of the eye -- Existing methods for eliminating effects of the eyelids -- Part 3: Our proposed model : the iris crypto agent system -- Biometric model for authentication using the iris of the eye -- Global model integrating a multiagent system -- Part 4: Implementation and simulations -- Implementations of new methods -- Simulation of modules -- Application. | |
| 520 |
_a'The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one hand the transition from a centralized to a decentralized system distributed locally or remotely, has facilitated the tasks in various sectors (i.e., educational, social, government, commercial, etc.). On the other hand, the integration of the Internet has encouraged communication at international level, and allowed operations remotely (i.e., e-commerce, e-banking, etc.). Besides the Internet, there is the mobile network that provides advanced services (i.e., multimedia messaging, Internet access, etc.)'-- _cProvided by publisher. |
||
| 650 | 0 | _aBiometric identification. | |
| 650 | 0 | _aIris (Eye). | |
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 856 | 4 | 2 |
_3Cover image _uhttp://jacketsearch.tandf.co.uk/common/jackets/covers/websmall/978146650/9781466502130.jpg |
| 907 |
_a.b15860784 _b2019-11-12 _c2019-11-12 |
||
| 942 |
_c01 _n0 _kTK7882.B56K536 |
||
| 914 | _avtls003554993 | ||
| 990 | _ark4 | ||
| 991 | _aFakulti Teknologi dan Sains Maklumat | ||
| 998 |
_at _b2014-05-03 _cm _da _feng _gflu _y0 _z.b15860784 |
||
| 999 |
_c565953 _d565953 |
||