MARC details
000 -LEADER |
fixed length control field |
02592nam a2200325Ia 4500 |
000 - LEADER |
fixed length control field |
03167nam a22003495i 4500 |
001 - CONTROL NUMBER |
control field |
978-981-99-5914-3 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240319121123.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
231016s2023 si | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9789819959143 |
-- |
978-981-99-5914-3 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
4.167 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Yu, Jiadi. |
9 (RLIN) |
38624 |
245 ## - TITLE STATEMENT |
Title |
WiFi signal-based user authentication |
Statement of responsibility, etc. |
by Jiadi Yu, Hao Kong, Linghe Kong. |
Medium |
[electronic resource] / |
250 ## - EDITION STATEMENT |
Edition statement |
1st ed. 2023. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Singapore |
Name of publisher, distributor, etc. |
Springer Nature Singapore |
Date of publication, distribution, etc. |
2023 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
IX, 96 p. 1 illus. |
Other physical details |
online resource. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addressing the security concern of IoT environment. However, due to the limited sensing capability of WiFi signals and wide application scenarios, WiFi signal-based user authentication suffers from practical issues of diversified behaviors and complex scenarios. Therefore, it is necessary to address the issues and build integrated systems for user authentication using WiFi signals. In this book, the development and progress of WiFi signal-based user authentication systems in extensive scenarios are presented, which provides a new direction and solution for ubiquitous security and privacy protection. This book gives strong motivation of leveraging WiFi signals to sense human activities for user authentication, and presents the key issues of WiFi-based user authentication in diversified behaviors and complex scenarios. This book provides the approaches for digging WiFi signals to sense human activities and extract features, realizing user authentication under fine-grained finger gestures, undefined body gestures, and multi-user scenarios. State-of-the-art researches and future directions involved with WiFi signal-based user authentication are presented and discussed as well. This book will benefit researchers and practitioners in the related field. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
9 (RLIN) |
38625 |
|
Topical term or geographic name entry element |
Computers, Special purpose. |
9 (RLIN) |
38626 |
|
Topical term or geographic name entry element |
Mobile and Network Security. |
9 (RLIN) |
38627 |
|
Topical term or geographic name entry element |
Mobile computing. |
9 (RLIN) |
38628 |
|
Topical term or geographic name entry element |
Mobile Computing. |
9 (RLIN) |
38629 |
|
Topical term or geographic name entry element |
Special Purpose and Application-Based Systems. |
9 (RLIN) |
38630 |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kong, Hao. |
9 (RLIN) |
38631 |
|
Personal name |
Kong, Linghe. |
9 (RLIN) |
38632 |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://doi.org/10.1007/978-981-99-5914-3">https://doi.org/10.1007/978-981-99-5914-3</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
e-Book |
Source of classification or shelving scheme |
Dewey Decimal Classification |