Muutke küpsiste eelistusi

E-raamat: Advances in User Authentication

  • Formaat - PDF+DRM
  • Hind: 61,74 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book is dedicated to advances in the field of user authentication. The book covers detailed description of the authentication process as well as types of authentication modalities along with their several features (authentication factors). It discusses the use of these modalities in a time-varying operating environment, including factors such as devices, media and surrounding conditions, like light, noise, etc. The book is divided into several parts that cover descriptions of several biometric and non-biometric authentication modalities, single factor and multi-factor authentication systems (mainly, adaptive), negative authentication system, etc. Adaptive strategy ensures the incorporation of the existing environmental conditions on the selection of authentication factors and provides significant diversity in the selection process. The contents of this book will prove useful to practitioners, researchers and students. The book is suited to be used a text in advanced/graduate

courses on User Authentication Modalities. It can also be used as a textbook for professional development and certification coursework for practicing engineers and computer scientists.

Authentication Basics.- Biometric Authentication.- Negative Authentication Systems.- Pseudo-Passwords and Non-Textual Approaches.- Multi-Factor Authentication.- Continuous Authentication.- Adaptive Multi-Factor Authentication.
1 Authentication Basics
1(36)
Introduction
2(1)
Types of Authentication Approaches
3(1)
Type I What You Know?
3(14)
Type II What You Have?
17(4)
Type III What You Are?
21(7)
Type IV Where You Are?
28(1)
User Account Types
29(1)
Chapter Summary
30(5)
References
35(2)
2 Biometric Authentication
37(48)
Introduction
38(2)
Different Biometric Modalities
40(2)
Biometric Authentication Process
42(3)
Performance Measures of Biometric Systems
45(1)
False Acceptance Rate (FAR)
45(1)
False Rejection Rate (FRR)
45(1)
Equal Error Rate (EER)
46(1)
Failure to Enroll Rate (FTE)
47(1)
Failure to Acquire Rate (FTA)
47(1)
Details of Biometric Authentication Modalities
47(1)
Face Recognition
47(2)
Fingerprint Recognition
49(2)
Iris Recognition
51(1)
Retina Recognition
52(1)
Hand Geometry
53(2)
Voice (Speaker) Recognition
55(2)
Keystroke Recognition
57(1)
Gait-Based Recognition
57(4)
Brainprint
61(1)
Applications of Biometrics
61(2)
Banking
63(1)
Computer Access
64(1)
Immigration
64(1)
National Identity
64(1)
Prisons
65(1)
Telecommunications
65(1)
Time and Attendance
65(1)
Limitations of Biometric Systems
66(1)
New Biometric Challenges
67(2)
Attacks on Biometric-Based Authentication Systems
69(2)
Mitigating Different Attacks on Biometric Systems
71(1)
Liveness Detection Mechanisms
71(1)
Steganographic and Watermarking Techniques
71(1)
Challenge-Response Systems
72(1)
Multimodal Biometric Systems
73(2)
Soft Biometrics
75(1)
Cancelable Biometrics
76(1)
Comparative Evaluation
77(2)
Chapter Summary
79(3)
References
82(3)
3 Negative Authentication Systems
85(62)
Introduction
86(1)
Concept of Negative Authentication
87(3)
Types of NAS
90(5)
Implementation of Negative Authentication System (NAS)
95(48)
Chapter Summary
143(1)
References
144(3)
4 Pseudo-Passwords and Non-textual Approaches
147(38)
Evolution of Hash Functions
148(1)
Honeyword Approach
149(1)
Honeychecker
150(6)
NLEs from the n-Gram Model Concept
156(1)
NLEs from the PCFG Model Concept
157(1)
Encoding or Decoding of the Sub-grammar (SG)
158(1)
Evaluating the Encoders
158(1)
Evaluating Single Passwords
159(1)
NoCrack Password Vaults
160(1)
Bloom Filter
161(1)
Constructing Bloom Filters
162(2)
Comparison of Complementary Approaches: NAS (G-NAS, GM-NAS), Honeywords, and Bloom Filter
164(1)
Non-textual Passwords
165(2)
Recognition-Based Techniques
167(4)
Recall-Based Techniques
171(4)
Security Aspects and Possible Attacks on Graphical Passwords
175(4)
Chapter Summary
179(1)
References
180(5)
5 Multi-Factor Authentication
185(50)
Introduction
186(2)
Issues of Single-Factor Authentication (SFA)
188(1)
Two-Factor-Based Authentication
188(2)
Different Authentication Factors Considered in MFA
190(1)
Necessity to Move Toward MFA
191(1)
Different Characteristics of a Good MFA
192(1)
Easy to Use
192(1)
Scalable
192(1)
Resilient
193(1)
Reliable
193(1)
Single Sign-On
193(3)
Fast Identity Online (FIDO)
196(2)
Universal Authentication Framework (UAF)
198(1)
Universal Second Factor (U2F)
198(1)
How FIDO Works
198(2)
MFA Authentication Products
200(1)
CA Strong Authentication
201(2)
Okta Verify
203(2)
Vasco IDENTIKEY Authentication Server 3.8
205(1)
Dell Defender
206(4)
Symantec Validation and ID Protection Service (VIP)
210(3)
RSASECURID
213(2)
SafeNet Authentication Service
215(2)
SecureAuth IdP 8.0
217(2)
Microsoft Azure
219(2)
Swivel Secure
221(1)
DUO Security
222(2)
Comparison of Various MFA Products
224(1)
Chapter Summary
224(6)
References
230(5)
6 Continuous Authentication
235(46)
Introduction
236(1)
Continuous/Active Authentication
236(2)
Characteristics of a Good Continuous Authentication System
238(1)
Steps to Design Continuous Authentication System
239(1)
Attribute Selection for Continuous Authentication System
239(1)
Unimodal Continuous Authentication
240(1)
Face Recognition
240(1)
Partial Face Recognition
241(1)
Web Browsing Behavior
241(3)
Dynamic Context Fingerprints
244(1)
Keystroke Dynamics
245(1)
Cognitive Fingerprint
246(2)
Screen Fingerprints
248(2)
Stylistic Fingerprint
250(1)
Hand Movement, Orientation, and Grasp (HMOG)
251(2)
Multi-modal Continuous Authentication
253(1)
Keystroke and Mouse Movement, Application Usage, and System Footprint
253(3)
Active Authentication for Mobile Devices
256(2)
Stylometry, Application Usage, Web Browsing, and GPS Location
258(1)
Multi-sensor Text-Based Biometric
259(2)
Gestures, Keystroke, Touch, and Body Movements
261(1)
Keystroke, Mouse Movement, Stylometry, Web Browsing Behavior
262(1)
Smartphone-Based Multi-sensor Authentication
263(3)
Continuous Authentication for Internet of Things (IoT)
266(1)
Self-authenticable Approaches for Wearable Devices
267(2)
The National Strategy for Trusted Identities in Cyberspace (NSTIC)
269(4)
Chapter Summary
273(2)
References
275(6)
7 Adaptive Multi-factor Authentication
281(72)
Introduction
282(1)
Adaptive-MFA (A-MFA) Framework
283(2)
Authentication Factor
285(1)
Considered Surrounding Conditions for MFA
285(3)
Trustworthy Framework for Authentication Factors
288(1)
First Approach
288(4)
Second Approach
292(14)
Adaptive Selection Approach for MFA
306(5)
Implementation of Adaptive-MFA System
311(1)
Surrounding Conditions (Light and Noise)
312(1)
Database to Store Authentication Factors
313(1)
Configuration of A-MFA System
314(2)
Client Application
316(20)
Experimental Results of the A-MFA System
336(1)
Creation of Synthetic Dataset
336(2)
System Evaluation Criteria
338(1)
Experimental Results
338(4)
Comparison of Adaptive Selection Approach with Random and Only Biometric-Based Approaches
342(3)
Advantage over Other Existing MFA Approaches
345(2)
Future Trends
347(3)
Chapter Summary
350(3)
References 353(5)
Service Part
Index 358
Dr. Dipankar Dasgupta joined the University of Memphis as an assistant professor in 1997 and became a full professor in 2004. He is the recipient of the 2011-2012 Willard R. Sparks Eminent Faculty Award, the highest distinction and most prestigious honor given to a faculty member by the University of Memphis.

Prof. Dasgupta is one of the founding fathers of the field of artificial immune systems, making major contributions in applying bio-inspired approaches to intrusion detection, spam detection, and building survivable systems . His latest book, Immunological Computation, is a graduate-level textbook published by CRC Press in 2008. He has also edited a Springer-Verlag book on artificial immune systems and another book on genetic algorithms.

Prof. Dasgupta has more than 200 publications. A search with his name in Google Scholar indicates more than 3,800 citations, and an academic search at Microsoft shows that he has collaborated with 106 co-authors -- extraordinary testimony to the broad influence of his contributions within the research community. He is the only Computer Science faculty member in Tennessee to be featured on UCLA's list of computer scientists whose h-index is above 40.

In addition to Prof. Dasgupta's research and creative activities, he spearheads the University of Memphis' education, training, and outreach activities on Information Assurance. He is the founding Director of the Center for Information Assurance, which is a nationally designated Center for Academic Excellence in Information Assurance Education and Research. He developed the University of Memphis' Graduate Certificate Program in Information Assurance and has established research collaborations with Oak Ridge National Laboratory.

Dr. Arunava Roy did his Ph.D. from the Department of Applied Mathematics, Indian School of Mines, Dhanbad and worked as a Post-Doctoral researcher in the Dept. of Computer Science, The University of Memphis, TN, USA. Dr. Roy currently at the University of Singapore as a research staff. He was a M.Sc. gold medallist and got INSPIRE fellowship (Govt. of India). His areas of interest are web software reliability, software reliability, cyber security, algorithm design and analysis, data structure, statistical and mathematical modelling.



Dr. Abhijit Kumar Nag obtained his Ph.D. in Computer Science from The University of Memphis. Previously he received his masters in Computer Engineering from The University of Memphis and got his bachelor degree in Computer Science and Engineering from Bangladesh University of Engineering and Technology. His primary research interest includes various authentication approaches, mainly continuous authentication and multi-factor authentication systems. His other research interests include evolutionary algorithms, biometric approaches, cloud computing, computer and network security, bio-inspired/nature-inspired computing, and anomaly detection. He is an inventor of a submitted Utility Patent on Adaptive Multi-factor Authentication System. He serves as a reviewer for many reputable peer-reviewed journals and conferences. He is currently an Assistant Professor of Computer Information Systems department at The Texas A&M-Central Texas, USA.