LEADER 00787nam0-2200289---450- 001 990010034060403321 005 20160129105349.0 035 $a001003406 035 $aFED01001003406 035 $a(Aleph)001003406FED01 035 $a001003406 100 $a20160129d2003----km-y0itay50------ba 101 0 $aeng 102 $aUS 105 $a--------001yy 200 1 $aASM Handbook corrosion: fundamentals, testing and protection$evolume 13 A$fS. D. Cramer and B.S. Covino 210 $aOhio$cASM$d2003 215 $aXXX, 1135 p.$cill.$d28 cm 610 0 $aHandbook 700 1$aCramer$bS. D. 701 1$aCovino$bB.S 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990010034060403321 952 $a14 P.026.048$b5083$fDINMP 959 $aDINMP 997 $aUNINA LEADER 03175nam 2200613 450 001 9910789893003321 005 20230125182541.0 010 $a1-60807-018-2 035 $a(CKB)2670000000133266 035 $a(EBL)829297 035 $a(OCoLC)769343996 035 $a(SSID)ssj0000652455 035 $a(PQKBManifestationID)12260434 035 $a(PQKBTitleCode)TC0000652455 035 $a(PQKBWorkID)10642595 035 $a(PQKB)11236085 035 $a(Au-PeEL)EBL829297 035 $a(CaPaEBR)ebr10522164 035 $a(CaBNVSL)mat09100850 035 $a(IEEE)9100850 035 $a(MiAaPQ)EBC829297 035 $a(EXLCZ)992670000000133266 100 $a20200729d2011 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBiometrics in identity management $econcepts to applications /$fShimon K. Modi 210 1$aBoston :$cArtech House,$dc2011. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2011] 215 $a1 online resource (278 p.) 225 1 $aInformation security and privacy series 300 $aDescription based upon print version of record. 311 $a1-60807-017-4 320 $aIncludes bibliographical references and index. 327 $aCh. 1. Introduction -- Ch. 2. Fundamentals of technical evaluations -- Ch. 3. Fingerprint recognition -- Ch. 4. Face recognition -- Ch. 5. Iris recognition -- Ch. 6. Hand geometry recognition -- Ch. 7. Speaker recognition -- Ch. 8. Vascular pattern recognition -- Ch. 9. Dynamic signature verification -- Ch. 10. Keystroke dynamics, retina, DNA, and gait recognition -- Ch. 11. Multibiometric systems -- Ch. 12. Biometric standards -- Ch. 13. Biometric testing and evaluation programs -- Ch. 14. Designing and deploying biometric systems -- Ch. 15. Biometric system security -- Ch. 16. Privacy concerns in biometric applications. 330 $aIn today's digital infrastructure we have to interact with an increasing number of systems, both in the physical and virtual world. Identity management (IdM) -- the process of identifying an individual and controlling access to resources based on their associated privileges -- is becoming progressively complex. This has brought the spotlight on the importance of effective and efficient means of ascertaining an individual's identity. Biometric technologies like fingerprint recognition, face recognition, iris recognition etc. have a long history of use in law enforcement applications and are now 410 0$aArtech House information security and privacy series. 606 $aBiometric identification 606 $aBiometric identification$xTechnological innovations 606 $aIdentification$xData processing 615 0$aBiometric identification. 615 0$aBiometric identification$xTechnological innovations. 615 0$aIdentification$xData processing. 676 $a570.191950285 700 $aModi$b Shimon K.$01584719 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910789893003321 996 $aBiometrics in identity management$93868672 997 $aUNINA