26,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
13 °P sammeln
  • Broschiertes Buch

Biometric systems are used to identify persons based on their unique biological or behavioral characteristics for example, finger prints. But, securing the biometric systems from vulnerabilities and threats that facing it, is a challenging task. This research analyzes and surveys the vulnerabilities and security threats of the finger print biometric systems used for access control and the authentication of access to confidential information in network system environment. As analysis tools, two biometric network models are implemented and connected to see the whole arguments of the…mehr

Produktbeschreibung
Biometric systems are used to identify persons based on their unique biological or behavioral characteristics for example, finger prints. But, securing the biometric systems from vulnerabilities and threats that facing it, is a challenging task. This research analyzes and surveys the vulnerabilities and security threats of the finger print biometric systems used for access control and the authentication of access to confidential information in network system environment. As analysis tools, two biometric network models are implemented and connected to see the whole arguments of the vulnerabilities and security threats. Based on that analysis and surveying, experimental solutions and countermeasures are presented. Also, suggestion of developing and improving the existing biometric network model is discussed to overcome the security threats and reach a high degree of the device and biometric network security.
Autorenporträt
My Name is Mohammad Abdulateef AlAhmad, I am a professor assistant in Computer Science department in College of Basic Education at Public Authority for Applied Education and Training, Kuwait. My main research area is information security. My research focuses on cryptographic algorithms and protocols. My favourite specific research topics are designing and analysis of hash functions, and cryptography in general. My favorite hash function is Gear hash function.