Iris biometric model for secured network access

"The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the...

Full description

Saved in:
Bibliographic Details
Main Author: Khoury, Franjieh El
Corporate Author: ProQuest (Firm)
Format: Electronic eBook
Language:English
Published: Boca Raton : CRC Press, 2013.
Subjects:
Online Access:Access E-Book
Access E-Book.
Description
Summary:"The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one hand the transition from a centralized to a decentralized system distributed locally or remotely, has facilitated the tasks in various sectors (i.e., educational, social, government, commercial, etc.). On the other hand, the integration of the Internet has encouraged communication at international level, and allowed operations remotely (i.e., e-commerce, e-banking, etc.). Besides the Internet, there is the mobile network that provides advanced services (i.e., multimedia messaging, Internet access, etc.)"--
Item Description:"An Auerbach book."
Physical Description:xvii, 194 p. : ill.
Bibliography:Includes bibliographical references and index.
Access:Access to electronic resources restricted to Simmons University students, faculty and staff.