LEADER 05322nam 22007095 450 001 996465445203316 005 20200701233324.0 010 $a3-030-39489-1 024 7 $a10.1007/978-3-030-39489-9 035 $a(CKB)4100000011279297 035 $a(MiAaPQ)EBC6216617 035 $a(DE-He213)978-3-030-39489-9 035 $a(PPN)248595903 035 $a(EXLCZ)994100000011279297 100 $a20200602d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecuring Social Identity in Mobile Platforms$b[electronic resource] $eTechnologies for Security, Privacy and Identity Management /$fedited by Thirimachos Bourlai, Panagiotis Karampelas, Vishal M. Patel 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (269 pages) 225 1 $aAdvanced Sciences and Technologies for Security Applications,$x1613-5113 311 $a3-030-39488-3 327 $aPart I ? Mobile-based Privacy & Security -- Shared Images and Camera Fingerprinting May Lead to Privacy Issues -- Presentation Attacks in Mobile and Continuous Behavioral Biometric Systems -- Personalized Data Minimization Assurance using Bluetooth Low Energy -- Part II ? Mobile-based Biometric Technologies -- On Designing a Forensic Toolkit for Rapid Detection of Factors that Impact Face Recognition Performance when Processing Large Scale Face Datasets -- Classification of Soft Biometric Traits when Matching Near-Infrared Long-range Face Images against their Visible Counterparts -- Quality and Match Performance Analysis of Band-Filtered Visible RGB Images -- Unconstrained Face Recognition using Cell Phone Devices: Faces in the Wild -- Face Detection in MWIR Spectrum -- Part III ? Mobile-based Active Authentication -- Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns -- Quickest Multiple User Active Authentication -- Iris Recognition on Mobile: Real-Time Feature Extraction and Matching in the Wild -- A Protocol for Decentralized Biometric-based Self-Sovereign Identity Ecosystem -- Towards Wider Adoption of Continuous Authentication on Mobile Devices. 330 $aThe book presents novel research in the areas of social identity and security when using mobile platforms. The topics cover a broad range of applications related to securing social identity as well as the latest advances in the field, including the presentation of novel research methods that are in the service of all citizens using mobile devices. More specifically, academic, industry-related and government (law enforcement, intelligence and defence) organizations, will benefit from the research topics of this book that cover the concept of identity management and security using mobile platforms from various perspectives, i.e. whether a user navigates to social media, accesses their own phone devices, access their bank accounts, uses online shopping service providers, accesses their personal documents or accounts with valuable information, surfs the internet, or even becomes a victim of cyberattacks. In all of the aforementioned cases, there is a need for mobile related technologies that protect the users? social identity and well-being in the digital world, including the use of biometrics, cybersecurity software and tools, active authentication and identity anti-spoofing algorithms and more. 410 0$aAdvanced Sciences and Technologies for Security Applications,$x1613-5113 606 $aComputers and civilization 606 $aSystem safety 606 $aSocial sciences?Data processing 606 $aSocial sciences?Computer programs 606 $aComputer crimes 606 $aBiometrics (Biology) 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 606 $aComputational Social Sciences$3https://scigraph.springernature.com/ontologies/product-market-codes/X34000 606 $aCybercrime$3https://scigraph.springernature.com/ontologies/product-market-codes/1B7000 606 $aBiometrics$3https://scigraph.springernature.com/ontologies/product-market-codes/I22040 615 0$aComputers and civilization. 615 0$aSystem safety. 615 0$aSocial sciences?Data processing. 615 0$aSocial sciences?Computer programs. 615 0$aComputer crimes. 615 0$aBiometrics (Biology). 615 14$aComputers and Society. 615 24$aSecurity Science and Technology. 615 24$aComputational Social Sciences. 615 24$aCybercrime. 615 24$aBiometrics. 676 $a005.8 702 $aBourlai$b Thirimachos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKarampelas$b Panagiotis$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPatel$b Vishal M$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465445203316 996 $aSecuring Social Identity in Mobile Platforms$92241069 997 $aUNISA