منابع مشابه
Biometric attack vectors and defences
Much has been reported on attempts to fool biometric sensors with false fingerprints, facial overlays and a myriad of other spoofing approaches. Other attack vectors on biometric systems have, however, had less prominence. This paper seeks to present a broader and more practical view of biometric system attack vectors, placing them in the context of a risk-based systems approach to security and...
متن کاملPlant Defences Against Herbivore and Insect Attack
The story of Adam and Eve links eating a forbidden fruit with death in the cycle of human existence (Genesis 3:1– 24). Indeed, to avoid poisoning, herbivores and omnivores such as humans must be cautious in choosing which plants and plant parts to eat. A prevailing hypothesis is that the nearly ubiquitous antiherbivore metabolites in plants were selected by coevolution with herbivores. Likewise...
متن کاملBiometric Cryptosystem based Energy Attack Analysis
Biometric cryptosystem provides a seamless connection between the biometrics and traditional password, and it represents a new development in the next generation cryptography. Even if the biometric cryptosystem is secure in algorithmic design, it may still be vulnerable to side-channel attack due to the physical leakage. To assess the possible side-channel attack on biometric cryptosystem, a se...
متن کاملThe Biometric Values of Affected and Fellow Eyes in Patients with Acute Attack of Primary Angle Closure
Background: It has been estimated that 67 million people worldwide are affected with a primary glaucoma and that one-third have primary angle closure glaucoma. We aimed to determine the biometric differences between the eyes of patients with acute attack of primary angle closure and their non-involved fellow eyes. Methods: Twenty eight patients with acute attack of primary angle closure were re...
متن کاملHow to Attack Biometric Systems in Your Spare Time
Biometric systems were proposed and developed to provide a better and stronger factor of authentication. Such systems authenticate individuals based on physical and behavioral traits such as fingerprints, iris, face, palm print, hand geometry, voice, etc. The use of biometric traits to replace existing passwords or as access keys has proven to be highly secure against physical attacks. It is a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2007
ISSN: 0167-4048
DOI: 10.1016/j.cose.2006.12.008