Advances in User Authentication: Infosys Science Foundation Series
Autor Dipankar Dasgupta, Arunava Roy, Abhijit Nagen Limba Engleză Paperback – 10 aug 2018
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 412.89 lei 38-45 zile | |
Springer International Publishing – 10 aug 2018 | 412.89 lei 38-45 zile | |
Hardback (1) | 470.61 lei 38-45 zile | |
Springer International Publishing – 11 sep 2017 | 470.61 lei 38-45 zile |
Din seria Infosys Science Foundation Series
- 15% Preț: 692.01 lei
- 20% Preț: 645.02 lei
- Preț: 377.78 lei
- 20% Preț: 1024.07 lei
- 20% Preț: 640.49 lei
- 15% Preț: 631.92 lei
- Preț: 494.13 lei
- 15% Preț: 530.61 lei
- 19% Preț: 470.61 lei
- 15% Preț: 634.00 lei
- 15% Preț: 516.83 lei
- 20% Preț: 549.93 lei
- 15% Preț: 696.72 lei
- Preț: 382.45 lei
- 15% Preț: 619.45 lei
- Preț: 447.68 lei
- 18% Preț: 891.38 lei
- 18% Preț: 718.60 lei
- 18% Preț: 868.64 lei
- 18% Preț: 989.38 lei
- 18% Preț: 876.67 lei
- 18% Preț: 711.97 lei
- 18% Preț: 768.42 lei
Preț: 412.89 lei
Nou
Puncte Express: 619
Preț estimativ în valută:
79.02€ • 83.12$ • 65.93£
79.02€ • 83.12$ • 65.93£
Carte tipărită la comandă
Livrare economică 06-13 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319864785
ISBN-10: 3319864785
Pagini: 360
Ilustrații: XIV, 360 p. 165 illus., 128 illus. in color.
Dimensiuni: 155 x 235 mm
Ediția:Softcover reprint of the original 1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Infosys Science Foundation Series, Infosys Science Foundation Series in Applied Sciences and Engineering
Locul publicării:Cham, Switzerland
ISBN-10: 3319864785
Pagini: 360
Ilustrații: XIV, 360 p. 165 illus., 128 illus. in color.
Dimensiuni: 155 x 235 mm
Ediția:Softcover reprint of the original 1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Infosys Science Foundation Series, Infosys Science Foundation Series in Applied Sciences and Engineering
Locul publicării:Cham, Switzerland
Cuprins
Authentication Basics.- Biometric Authentication.- Negative Authentication Systems.- Pseudo-Passwords and Non-Textual Approaches.- Multi-Factor Authentication.- Continuous Authentication.- Adaptive Multi-Factor Authentication.
Notă biografică
Dr. Dipankar Dasgupta joined the University of Memphis as an assistant professor in 1997 and became a full professor in 2004. He is the recipient of the 2011-2012 Willard R. Sparks Eminent Faculty Award, the highest distinction and most prestigious honor given to a faculty member by the University of Memphis.
Prof. Dasgupta is one of the founding fathers of the field of artificial immune systems, making major contributions in applying bio-inspired approaches to intrusion detection, spam detection, and building survivable systems . His latest book, Immunological Computation, is a graduate-level textbook published by CRC Press in 2008. He has also edited a Springer-Verlag book on artificial immune systems and another book on genetic algorithms.
Prof. Dasgupta has more than 200 publications. A search with his name in Google Scholar indicates more than 3,800 citations, and an academic search at Microsoft shows that he has collaborated with 106 co-authors -- extraordinary testimony to the broad influence of his contributions within the research community. He is the only Computer Science faculty member in Tennessee to be featured on UCLA's list of computer scientists whose h-index is above 40.
In addition to Prof. Dasgupta's research and creative activities, he spearheads the University of Memphis' education, training, and outreach activities on Information Assurance. He is the founding Director of the Center for Information Assurance, which is a nationally designated Center for Academic Excellence in Information Assurance Education and Research. He developed the University of Memphis' Graduate Certificate Program in Information Assurance and has established research collaborations with Oak Ridge National Laboratory.
Prof. Dasgupta is one of the founding fathers of the field of artificial immune systems, making major contributions in applying bio-inspired approaches to intrusion detection, spam detection, and building survivable systems . His latest book, Immunological Computation, is a graduate-level textbook published by CRC Press in 2008. He has also edited a Springer-Verlag book on artificial immune systems and another book on genetic algorithms.
Prof. Dasgupta has more than 200 publications. A search with his name in Google Scholar indicates more than 3,800 citations, and an academic search at Microsoft shows that he has collaborated with 106 co-authors -- extraordinary testimony to the broad influence of his contributions within the research community. He is the only Computer Science faculty member in Tennessee to be featured on UCLA's list of computer scientists whose h-index is above 40.
In addition to Prof. Dasgupta's research and creative activities, he spearheads the University of Memphis' education, training, and outreach activities on Information Assurance. He is the founding Director of the Center for Information Assurance, which is a nationally designated Center for Academic Excellence in Information Assurance Education and Research. He developed the University of Memphis' Graduate Certificate Program in Information Assurance and has established research collaborations with Oak Ridge National Laboratory.
Dr. Arunava Roy did his Ph.D. from the Department of Applied Mathematics, Indian School of Mines, Dhanbad and worked as a Post-Doctoral researcher in the Dept. of Computer Science, The University of Memphis, TN, USA. Dr. Roy currently at the University of Singapore as a research staff. He was a M.Sc. gold medallist and got INSPIRE fellowship (Govt. of India). His areas of interest are web software reliability, software reliability, cyber security, algorithm design and analysis, data structure, statistical and mathematical modelling.
Dr. Abhijit Kumar Nag obtained his Ph.D. in Computer Science from The University of Memphis. Previously he received his master’s in Computer Engineering from The University of Memphis and got his bachelor degree in Computer Science and Engineering from Bangladesh University of Engineering and Technology. His primary research interest includes various authentication approaches, mainly continuous authentication and multi-factor authentication systems. His other research interests include evolutionary algorithms, biometric approaches, cloud computing, computer and network security, bio-inspired/nature-inspired computing, and anomaly detection. He is an inventor of a submitted Utility Patent on Adaptive Multi-factor Authentication System. He serves as a reviewer for many reputable peer-reviewed journals and conferences. He is currently an Assistant Professor of Computer Information Systems department at The Texas A&M-Central Texas, USA.
Textul de pe ultima copertă
This book is dedicated to advances in the field of user authentication. The book covers detailed description of the authentication process as well as types of authentication modalities along with their several features (authentication factors). It discusses the use of these modalities in a time-varying operating environment, including factors such as devices, media and surrounding conditions, like light, noise, etc. The book is divided into several parts that cover descriptions of several biometric and non-biometric authentication modalities, single factor and multi-factor authentication systems (mainly, adaptive), negative authentication system, etc. Adaptive strategy ensures the incorporation of the existing environmental conditions on the selection of authentication factors and provides significant diversity in the selection process. The contents of this book will prove useful to practitioners, researchers and students. The book is suited to be used a text in advanced/graduate courses on User Authentication Modalities. It can also be used as a textbook for professional development and certification coursework for practicing engineers and computer scientists.
Caracteristici
Covers different authentication approaches and their advantages and disadvantages Provides best practices for secure online access of information resources Includes a special chapter on an innovative approach called Negative Authentication (a game-changer) Gives details of recent trends in continuous active authentication techniques as next generation identity ecosystem and industry adoption such systems Includes supplementary material: sn.pub/extras