LEADER 03551nam 22005655 450 001 9910799496503321 005 20240109220847.0 010 $a3-031-49071-1 024 7 $a10.1007/978-3-031-49071-2 035 $a(MiAaPQ)EBC31061724 035 $a(Au-PeEL)EBL31061724 035 $a(OCoLC)1417196350 035 $a(DE-He213)978-3-031-49071-2 035 $a(EXLCZ)9929568994000041 100 $a20240109d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aContinuous Biometric Authentication Systems$b[electronic resource] $eAn Overview /$fby Max Smith-Creasey 205 $a1st ed. 2024. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2024. 215 $a1 online resource (127 pages) 225 1 $aSpringerBriefs in Computer Science,$x2191-5776 311 08$aPrint version: Smith-Creasey, Max Continuous Biometric Authentication Systems Cham : Springer International Publishing AG,c2024 9783031490705 327 $aIntroduction -- Traditional Authentication -- Continuous Authentication -- Biometrics for Continuous Authentication -- Considerations and Challenges -- Conclusion. 330 $aThis book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges. This book brings together a wide variety of key motivations, components and advantages of continuous biometric authentication systems. The overview is kept high level, so as not to limit the scope to any single device, biometric trait, use-case, or scenario. Therefore, the contents of this book are applicable to devices ranging from smartphones to desktop computers, utilising biometrics ranging from face recognition to keystroke dynamics. It also provides metrics from a variety of existing systems such that users can identify the advantages and disadvantages of different approaches. This book targets researchers and lecturers working in authentication, as well as advanced-level students in computer science interested in this field. The book will also be of interest to technical professionals working in cyber security. 410 0$aSpringerBriefs in Computer Science,$x2191-5776 606 $aBiometric identification 606 $aPattern recognition systems 606 $aData protection$xLaw and legislation 606 $aBiometrics 606 $aAutomated Pattern Recognition 606 $aPrivacy 615 0$aBiometric identification. 615 0$aPattern recognition systems. 615 0$aData protection$xLaw and legislation. 615 14$aBiometrics. 615 24$aAutomated Pattern Recognition. 615 24$aPrivacy. 676 $a006.248 700 $aSmith-Creasey$b Max$01586177 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910799496503321 996 $aContinuous Biometric Authentication Systems$93872455 997 $aUNINA