Iris biometric model for secured network access

The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one h...

Descripción completa

Detalles Bibliográficos
Otros Autores: Khoury, Franjieh El., author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton : CRC Press 2013.
Boca Raton : 2013.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628845406719
Descripción
Sumario:The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one hand the transition from a centralized to a decentralized system distributed locally or remotely, has facilitated the tasks in various sectors (i.e., educational, social, government, commercial, etc.). On the other hand, the integration of the Internet has encouraged communication at international level, and allowed operations remotely (i.e., e-commerce, e-banking, etc.). Besides the Internet, there is the mobile network that provides advanced services (i.e., multimedia messaging, Internet access, etc.)--
Notas:"An Auerbach book."
Descripción Física:1 online resource (215 p.)
Bibliografía:Includes bibliographical references and index.
ISBN:9781040052730
9780429067198
9781466502147