語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Securing Social Identity in Mobile P...
~
SpringerLink (Online service)
Securing Social Identity in Mobile Platforms = Technologies for Security, Privacy and Identity Management /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Securing Social Identity in Mobile Platforms/ edited by Thirimachos Bourlai, Panagiotis Karampelas, Vishal M. Patel.
其他題名:
Technologies for Security, Privacy and Identity Management /
其他作者:
Patel, Vishal M.
面頁冊數:
XIV, 262 p. 99 illus., 90 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Biometrics. -
電子資源:
https://doi.org/10.1007/978-3-030-39489-9
ISBN:
9783030394899
Securing Social Identity in Mobile Platforms = Technologies for Security, Privacy and Identity Management /
Securing Social Identity in Mobile Platforms
Technologies for Security, Privacy and Identity Management /[electronic resource] :edited by Thirimachos Bourlai, Panagiotis Karampelas, Vishal M. Patel. - 1st ed. 2020. - XIV, 262 p. 99 illus., 90 illus. in color.online resource. - Advanced Sciences and Technologies for Security Applications,1613-5113. - Advanced Sciences and Technologies for Security Applications,.
Part I – Mobile-based Privacy & Security -- Shared Images and Camera Fingerprinting May Lead to Privacy Issues -- Presentation Attacks in Mobile and Continuous Behavioral Biometric Systems -- Personalized Data Minimization Assurance using Bluetooth Low Energy -- Part II – Mobile-based Biometric Technologies -- On Designing a Forensic Toolkit for Rapid Detection of Factors that Impact Face Recognition Performance when Processing Large Scale Face Datasets -- Classification of Soft Biometric Traits when Matching Near-Infrared Long-range Face Images against their Visible Counterparts -- Quality and Match Performance Analysis of Band-Filtered Visible RGB Images -- Unconstrained Face Recognition using Cell Phone Devices: Faces in the Wild -- Face Detection in MWIR Spectrum -- Part III – Mobile-based Active Authentication -- Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns -- Quickest Multiple User Active Authentication -- Iris Recognition on Mobile: Real-Time Feature Extraction and Matching in the Wild -- A Protocol for Decentralized Biometric-based Self-Sovereign Identity Ecosystem -- Towards Wider Adoption of Continuous Authentication on Mobile Devices.
The book presents novel research in the areas of social identity and security when using mobile platforms. The topics cover a broad range of applications related to securing social identity as well as the latest advances in the field, including the presentation of novel research methods that are in the service of all citizens using mobile devices. More specifically, academic, industry-related and government (law enforcement, intelligence and defence) organizations, will benefit from the research topics of this book that cover the concept of identity management and security using mobile platforms from various perspectives, i.e. whether a user navigates to social media, accesses their own phone devices, access their bank accounts, uses online shopping service providers, accesses their personal documents or accounts with valuable information, surfs the internet, or even becomes a victim of cyberattacks. In all of the aforementioned cases, there is a need for mobile related technologies that protect the users’ social identity and well-being in the digital world, including the use of biometrics, cybersecurity software and tools, active authentication and identity anti-spoofing algorithms and more.
ISBN: 9783030394899
Standard No.: 10.1007/978-3-030-39489-9doiSubjects--Topical Terms:
677095
Biometrics.
LC Class. No.: QA76.9.C66
Dewey Class. No.: 004
Securing Social Identity in Mobile Platforms = Technologies for Security, Privacy and Identity Management /
LDR
:03952nam a22004095i 4500
001
1028433
003
DE-He213
005
20200701233324.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030394899
$9
978-3-030-39489-9
024
7
$a
10.1007/978-3-030-39489-9
$2
doi
035
$a
978-3-030-39489-9
050
4
$a
QA76.9.C66
072
7
$a
UBJ
$2
bicssc
072
7
$a
COM079000
$2
bisacsh
072
7
$a
UBJ
$2
thema
082
0 4
$a
004
$2
23
245
1 0
$a
Securing Social Identity in Mobile Platforms
$h
[electronic resource] :
$b
Technologies for Security, Privacy and Identity Management /
$c
edited by Thirimachos Bourlai, Panagiotis Karampelas, Vishal M. Patel.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XIV, 262 p. 99 illus., 90 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advanced Sciences and Technologies for Security Applications,
$x
1613-5113
505
0
$a
Part I – Mobile-based Privacy & Security -- Shared Images and Camera Fingerprinting May Lead to Privacy Issues -- Presentation Attacks in Mobile and Continuous Behavioral Biometric Systems -- Personalized Data Minimization Assurance using Bluetooth Low Energy -- Part II – Mobile-based Biometric Technologies -- On Designing a Forensic Toolkit for Rapid Detection of Factors that Impact Face Recognition Performance when Processing Large Scale Face Datasets -- Classification of Soft Biometric Traits when Matching Near-Infrared Long-range Face Images against their Visible Counterparts -- Quality and Match Performance Analysis of Band-Filtered Visible RGB Images -- Unconstrained Face Recognition using Cell Phone Devices: Faces in the Wild -- Face Detection in MWIR Spectrum -- Part III – Mobile-based Active Authentication -- Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns -- Quickest Multiple User Active Authentication -- Iris Recognition on Mobile: Real-Time Feature Extraction and Matching in the Wild -- A Protocol for Decentralized Biometric-based Self-Sovereign Identity Ecosystem -- Towards Wider Adoption of Continuous Authentication on Mobile Devices.
520
$a
The book presents novel research in the areas of social identity and security when using mobile platforms. The topics cover a broad range of applications related to securing social identity as well as the latest advances in the field, including the presentation of novel research methods that are in the service of all citizens using mobile devices. More specifically, academic, industry-related and government (law enforcement, intelligence and defence) organizations, will benefit from the research topics of this book that cover the concept of identity management and security using mobile platforms from various perspectives, i.e. whether a user navigates to social media, accesses their own phone devices, access their bank accounts, uses online shopping service providers, accesses their personal documents or accounts with valuable information, surfs the internet, or even becomes a victim of cyberattacks. In all of the aforementioned cases, there is a need for mobile related technologies that protect the users’ social identity and well-being in the digital world, including the use of biometrics, cybersecurity software and tools, active authentication and identity anti-spoofing algorithms and more.
650
2 4
$a
Biometrics.
$3
677095
650
2 4
$a
Cybercrime.
$3
1109747
650
2 4
$a
Computational Social Sciences.
$3
1141127
650
2 4
$a
Security Science and Technology.
$3
783419
650
1 4
$a
Computers and Society.
$3
669900
650
0
$a
Biometrics (Biology).
$3
1249740
650
0
$a
Computer crimes.
$3
564161
650
0
$a
Social sciences—Computer programs.
$3
1280454
650
0
$a
Social sciences—Data processing.
$3
1280453
650
0
$a
System safety.
$3
639363
650
0
$a
Computers and civilization.
$3
556557
700
1
$a
Patel, Vishal M.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1074756
700
1
$a
Karampelas, Panagiotis.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1106858
700
1
$a
Bourlai, Thirimachos.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1105746
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030394882
776
0 8
$i
Printed edition:
$z
9783030394905
776
0 8
$i
Printed edition:
$z
9783030394912
830
0
$a
Advanced Sciences and Technologies for Security Applications,
$x
1613-5113
$3
1266773
856
4 0
$u
https://doi.org/10.1007/978-3-030-39489-9
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入