26,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
  • Broschiertes Buch

Security is major concern in today's world, only passwords not enough as credentials for authentication and authorization. As we know that Identity theft is a crime in which hackers does the unauthorized activity under stolen identity by using credentials such as passwords, usernames etc. This proposed User verification methods provide a security layer in addition to username and password by continuously validating the identity of the logged-on user based on their physiological and behavioral characteristics. This method is a novel method that continuously verifies the user according to…mehr

Produktbeschreibung
Security is major concern in today's world, only passwords not enough as credentials for authentication and authorization. As we know that Identity theft is a crime in which hackers does the unauthorized activity under stolen identity by using credentials such as passwords, usernames etc. This proposed User verification methods provide a security layer in addition to username and password by continuously validating the identity of the logged-on user based on their physiological and behavioral characteristics. This method is a novel method that continuously verifies the user according to characteristics of their interaction with the mouse which comes under behavioral characteristics.
Autorenporträt
He has completed his M.Tech(CST) from DOT, Shivaji University, Kolhapur (M.S), India and pursuing his PhD in IOT and Data Science. Currently he is working as Assistant Professor and Academic Coordinator in CSE, Sharad Institute of Technology College of Engineering, Ichalkaranji, M.S. Also he is founder of IT Firm named Extreme IT Solutions India