Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book examines important security considerations for the Internet of Things (IoT). IoT is collecting a growing amount of private and sensitive data about our lives, and requires increasing degrees of reliability and trustworthiness in terms of the levels of assurance provided with respect to confidentiality, integrity and availability.
User-Centric Privacy and Security in Biometrics explores how developments in biometrics will address security and privacy aspects. The book surveys and evaluates how biometric techniques can enhance and increase the reliability of security strategies in a variety of applications.
This book is about the use of biometrics on mobile/smart phones. An integrated and informative analysis, this is a timely survey of the state of the art research and developments in this rapidly growing area.
This book provides an overview of scientific fundamentals and principles of iris and periocular biometric recognition. It covers: an introduction to iris and periocular recognition; a selective overview of issues and challenges; soft biometric classification; security aspects; privacy protection and forensics; and future trends.
This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.
In this edited book, the authors delineate the challenges of building accountability into the Internet of Things and solutions for delivering on this critical societal challenge. They explain how the accountability principle impacts IoT development by presenting empirical studies of accountability in action.
Hand-based biometrics identifies users by unique features in their hands, such as fingerprints, palmprints, hand geometry, and finger and palm vein patterns. This book explores the range of technologies and methods under development and in use for hand-based biometrics, with evaluations of the advantages and performance of each.
This is a timely review of the fundamentals, the latest developments and the diverse applications of nature-inspired algorithms in cyber security and resiliency. Based on concepts from natural processes, phenomena and organisms, it presents novel methodologies to cope with cyber security challenges.
This book covers the state-of-art global research on authentication technologies for security and privacy in information systems, including applications, research challenges and future research directions.
This edited book presents the state of the art in voice biometrics research and technologies including implementation and deployment challenges in terms of interoperability, scalability and performance, and security.
This book covers physical layer security (PHY) for wireless sensing and radio environment concepts along with the related security implications in terms of eavesdropping, disruption, manipulation and, in general, the exploitation of wireless sensing by unauthorised users.
This edited book covers advances, trends and future opportunities in the security framework of social media-computing. The authors focus on how to protect social media platforms, and present methods for making social media computing more reliable and effective to achieve trusted IoT-based social computing with Blockchain technology.
The book proposes solutions to revamp traditional security architecture by addressing critical security challenges in commercialized 5G and envisioned 6G wireless communication systems. New insights into real-world scenarios for the deployment, applications and management of robust, secure, and efficient security schemes are discussed.
This book presents cutting-edge research on the use of AI for biometrics and cybersecurity including Machine and Deep Learning architectures, emerging applications and ethical and legal concerns.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.