Sciweavers

8 search results - page 1 / 2
» Biometric attack vectors and defences
Sort
View
BIOID
2008
149views Biometrics» more  BIOID 2008»
13 years 8 months ago
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Abstract. To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a...
Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J....
FC
2005
Springer
98views Cryptology» more  FC 2005»
13 years 11 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
BIOSIG
2009
104views Biometrics» more  BIOSIG 2009»
13 years 3 months ago
A Note on the Protection Level of Biometric Data in Electronic Passports
: Following regulations of the EU Council in 2004, the member states have deployed electronic passports according to ICAO standards. Such documents contain an embedded radio freque...
Harald Baier, Tobias Straub
HICSS
2010
IEEE
276views Biometrics» more  HICSS 2010»
14 years 26 days ago
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices
This paper provides insight into the ramifications of battery exhaustion Denial of Service (DoS) attacks on battery-powered mobile devices. Several IEEE 802.11 Wi-Fi, IEEE 802.15....
Benjamin R. Moyers, John Paul Dunning, Randolph Ma...