• Charles A. Shoniregun
Part of the Advances in Information Security book series (ADIS, volume 34)


Internet Service Provider Port Number Biometric Data Biometric Authentication False Rejection Rate 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Anderson, R., 2001, Security Engineering: A Guide to Building Dependable Distributed Systems, John Wiley & Sons, Inc.Google Scholar
  2. Azenabor, C.E., and Shoniregun, C.A., 2006, Electronic Government Security Issues, In Proceedings of the International Conference of Internet Technology and Secured Transactions (ICITST-2006), London, UK.Google Scholar
  3. Bellowin, S.M., 1989, Security Problems in the TCP/IP Protocol Suite, Computer Communications Review, May.Google Scholar
  4. Danielyan, E., 2004, The Lure of Biometrics. Available At: http://www.cisco.com/warp/public/ 759/ipj_7-1.pdf (24 January 2007)Google Scholar
  5. Kaucher, C., 2004, An Inaugural lecture on biometrics USA, National Defense University, http://www.biometrics.dod.mil/bio101/10.aspx (23 January 2007)Google Scholar
  6. Landwehr, C.E., and Goldschlag, D.M., 1998, Security Issues with Internet Access, In Proceedings of IEEE, Vol. 85, No. 12, December.Google Scholar
  7. Libov, Y., 2004, Biometrics: Technology that Gives You a Password You can’t share, http://www.securitydocs.com/library/1032 (31 January 2007)Google Scholar
  8. Oppliger, R., 1997, ‘Firewalls and Beyond’, Communication of the ACM, May 1997.Google Scholar
  9. Palmgren, K., 2005, Biometric Authentication, An Introduction, http://www.securitydocs.com/library/3003 (3 January 2007)Google Scholar
  10. Shoniregun, C.A., Chochliouros, I.P., Laperche, B., Logvynovskiy, O., and Spiliopoulou-Chochliourou, A., 2004, Questioning The Boundary Issues of Internet Security, e-Centre for Infonomics, London.Google Scholar
  11. Shoniregun, C. A., 2005, Impacts and Risk Assessment of Technology for Internet Security: Enable information Small-medium Enterprises (TEISMEs), Springer New York, USA.Google Scholar
  12. Taylor L., 2002, Understanding IPSec, Intranet JournalGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Charles A. Shoniregun
    • 1
  1. 1.Reader in Computing, KNURE/KSAC Distinguished Professor, School of Computing & TechnologyUniversity of East LondonLondon E16 2RDUnited Kingdom

Personalised recommendations