Advances in User Authentication

  • 5h
  • Abhijit Nag, Arunava Roy, Dipankar Dasgupta
  • Springer
  • 2017

This book is dedicated to advances in the field of user authentication. The book covers detailed description of the authentication process as well as types of authentication modalities along with their several features (authentication factors). It discusses the use of these modalities in a time-varying operating environment, including factors such as devices, media and surrounding conditions, like light, noise, etc. The book is divided into several parts that cover descriptions of several biometric and non-biometric authentication modalities, single factor and multi-factor authentication systems (mainly, adaptive), negative authentication system, etc. Adaptive strategy ensures the incorporation of the existing environmental conditions on the selection of authentication factors and provides significant diversity in the selection process. The contents of this book will prove useful to practitioners, researchers and students. The book is suited to be used a text in advanced/graduate courses on User Authentication Modalities. It can also be used as a textbook for professional development and certification coursework for practicing engineers and computer scientists.

About the Authors

Dr. Dipankar Dasgupta joined the University of Memphis as an assistant professor in 1997 and became a full professor in 2004. He is the recipient of the 2011-2012 Willard R. Sparks Eminent Faculty Award, the highest distinction and most prestigious honor given to a faculty member by the University of Memphis.

Prof. Dasgupta is one of the founding fathers of the field of artificial immune systems, making major contributions in applying bio-inspired approaches to intrusion detection, spam detection, and building survivable systems . His latest book, Immunological Computation, is a graduate-level textbook published by CRC Press in 2008. He has also edited a Springer-Verlag book on artificial immune systems and another book on genetic algorithms.

Prof. Dasgupta has more than 200 publications. A search with his name in Google Scholar indicates more than 3,800 citations, and an academic search at Microsoft shows that he has collaborated with 106 co-authors -- extraordinary testimony to the broad influence of his contributions within the research community. He is the only Computer Science faculty member in Tennessee to be featured on UCLA's list of computer scientists whose h-index is above 40.

In addition to Prof. Dasgupta's research and creative activities, he spearheads the University of Memphis' education, training, and outreach activities on Information Assurance. He is the founding Director of the Center for Information Assurance, which is a nationally designated Center for Academic Excellence in Information Assurance Education and Research. He developed the University of Memphis' Graduate Certificate Program in Information Assurance and has established research collaborations with Oak Ridge National Laboratory.

Dr. Arunava Roy did his Ph.D. from the Department of Applied Mathematics, Indian School of Mines, Dhanbad and worked as a Post-Doctoral researcher in the Dept. of Computer Science, The University of Memphis, TN, USA. Dr. Roy currently at the University of Singapore as a research staff. He was a M.Sc. gold medallist and got INSPIRE fellowship (Govt. of India). His areas of interest are web software reliability, software reliability, cyber security, algorithm design and analysis, data structure, statistical and mathematical modelling.

Dr. Abhijit Kumar Nag obtained his Ph.D. in Computer Science from The University of Memphis. Previously he received his master’s in Computer Engineering from The University of Memphis and got his bachelor degree in Computer Science and Engineering from Bangladesh University of Engineering and Technology. His primary research interest includes various authentication approaches, mainly continuous authentication and multi-factor authentication systems. His other research interests include evolutionary algorithms, biometric approaches, cloud computing, computer and network security, bio-inspired/nature-inspired computing, and anomaly detection. He is an inventor of a submitted Utility Patent on Adaptive Multi-factor Authentication System. He serves as a reviewer for many reputable peer-reviewed journals and conferences. He is currently an Assistant Professor of Computer Information Systems department at The Texas A&M-Central Texas, USA.

In this Book

  • Authentication Basics—Key to the Kingdom – Access a Computing System
  • Biometric Authentication—Authentication Through Human Characteristics
  • Negative Authentication Systems—Who Am I? “I Am Not This; No, Nor Am I This, Nor This,” Then Which Remains is the Identity of I
  • Pseudo-Passwords and Non-Textual Approaches—Beyond Passwords—Graphical Authentication
  • Multi-Factor Authentication—More Secure Approach towards Authenticating Individuals
  • Continuous Authentication—Authenticating Individuals Frequently during Sessions to Assure Valid Identity
  • Adaptive Multi-Factor Authentication—Bring Dynamicity in Multi-Factor Authentication Process


Rating 4.7 of 266 users Rating 4.7 of 266 users (266)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.5 of 201 users Rating 4.5 of 201 users (201)