Sciweavers

107 search results - page 3 / 22
» Vulnerabilities in Biometric Encryption Systems
Sort
View
DICTA
2007
13 years 6 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
AVBPA
2005
Springer
288views Biometrics» more  AVBPA 2005»
13 years 10 months ago
Addressing the Vulnerabilities of Likelihood-Ratio-Based Face Verification
Abstract. Anti-spoofing protection of biometric systems is always a serious issue in real-life applications of an automatic personal verification system. Despite the fact that face...
Krzysztof Kryszczuk, Andrzej Drygajlo
HICSS
2008
IEEE
90views Biometrics» more  HICSS 2008»
13 years 11 months ago
Power System Extreme Event Detection: The Vulnerability Frontier
In this work we apply graph theoretic tools to provide a close bound on a frontier relating the number of line outages in a grid to the power disrupted by the outages. This fronti...
Bernard C. Lesieutre, Ali Pinar, Sandip Roy
CCS
2008
ACM
13 years 7 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
12 years 9 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...