Sciweavers

347 search results - page 10 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
ECIS
2001
14 years 11 months ago
The Articulation of Shared Meaning in Information Systems Development
This paper presents a case study showing how Repertory Grid Analysis (RGA) can be used to construct shared meaning during information systems development, implementation and use. ...
Christopher J. Davis
TIP
2010
107views more  TIP 2010»
14 years 4 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
COMPSEC
2006
110views more  COMPSEC 2006»
14 years 10 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
ICICS
2001
Springer
15 years 2 months ago
Quantifying Network Denial of Service: A Location Service Case Study
Network Denial of Service (DoS) attacks are increasing in frequency, severity and sophistication, making it desirable to measure the resilience of systems to DoS attacks. In this p...
Yan Chen, Adam W. Bargteil, David Bindel, Randy H....
SP
2009
IEEE
15 years 4 months ago
Privacy Weaknesses in Biometric Sketches
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order to alleviate such concerns: rather than comparing...
Koen Simoens, Pim Tuyls, Bart Preneel