IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cloud and Cyber Security Through Crypt-Iris-Based Authentication Approach

Cloud and Cyber Security Through Crypt-Iris-Based Authentication Approach
View Sample PDF
Author(s): Sherin Zafar (Jamia Hamdard, India)
Copyright: 2019
Pages: 20
Source title: Cloud Security: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-8176-5.ch043

Purchase

View Cloud and Cyber Security Through Crypt-Iris-Based Authentication Approach on the publisher's website for pricing and purchasing information.

Abstract

In today's world, wireless technology utilized by cloud and cyber technology has become an essential part of each and every user. Sensitivity, authentication and validation needs to be looked upon. Traditional technologies using simple encryption and password mechanisms cannot look upon the security constraints of today's cyber world; hence, some better authentication aspects like biometric security utilizing most strong feature like iris are exploited in this chapter to serve as specific secure tool.

Related Content

A. Ashwini, S. Balasubramaniam, Seifedine Kadry. © 2025. 26 pages.
Bhupinder Singh, Christian Kaunert. © 2025. 20 pages.
A. Ashwini, V. Kavitha, S. Balasubramaniam, B. Sundaravadivazhagan. © 2025. 30 pages.
Abhinav Kumar, Anindya Bag, Aseem Anand, Siddhant Saha, Hitesh Mohapatra, Manjur Kolhar. © 2025. 22 pages.
Bhupinder Singh, Christian Kaunert. © 2025. 22 pages.
M. Abinaya. © 2025. 30 pages.
Dipti Chauhan, Jay Kumar Jain. © 2025. 28 pages.
Body Bottom