نتایج جستجو برای: spoofing order

تعداد نتایج: 910816  

2015
Zhizheng Wu Tomi Kinnunen Nicholas W. D. Evans Junichi Yamagishi Cemal Hanilçi Md. Sahidullah Aleksandr Sizov

An increasing number of independent studies have confirmed the vulnerability of automatic speaker verification (ASV) technology to spoofing. However, in comparison to that involving other biometric modalities, spoofing and countermeasure research for ASV is still in its infancy. A current barrier to progress is the lack of standards which impedes the comparison of results generated by different...

2015

This white paper discusses methods and findings from one of Novetta’s many approaches to vulnerability assessment: the fabrication of non-gelatinous artifacts for capacitive fingerprint sensors. We present methods of evaluating artifact performance relative to that of live presentations and gummy fingerprint artifacts. Two sets of artifacts are comprised of latex face paint or acrylic fabric pa...

2016
Azadeh Amir Asgari Benny Lövström

.................................................................................................................................... I ACKNOWLEDGMENT.................................................................................................................II Table Of

2012
Rajesh Kumar I. M. Talwar Eugene Y. Vasserman Nicholas James Tyra

The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consi...

2008
Jun Bi Ping Hu Lizhong Xie

Shim6 is an important multihoming solution. This paper studies shim6 from several perspectives, including shim6 protocol implementation, shim6 mechanism optimization and security enhancement. In order to provide a shim6 research platform, we implement shim6 protocol on the Linux 2.6 platform as one of the first reference implementations. Based on this research platform, we refine the shim6 addr...

Journal: :CoRR 2013
Deepali Virmani Nidhi Beniwal Gargi Mandal Saloni Talwar

As computer systems become more pervasive and complex, security is increasingly important. Secure Transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. Many secure transmission methods require a type of encryption. Secure transmissions are put in place to prevent attacks such as ARP spoofing and general data loss. Hence, in order to p...

2013

Viruses, Trojan horses, worms, back doors, spoofing, DoS attacks, and other cyber-security threats are now part of everyone’s computer vocabulary. What’s next? For all of its promise, the Internet of Things is likely to become the greatest challenge for security technology to date, defying conventional security solutions, paradigms, and tools. The Internet of Things is a global revolution in wh...

2014
Narishige Abe Takashi Shinzaki N. Abe T. Shinzaki

Biometric authentication technologies, such as fingerprint, face, iris, and vein, have been widespread in many applications from individual portable devices to national ID management systems. Furthermore, relatively newer biometric authentication modalities including eye movement, lip-motion, etc., have been also researched and developed in order to improve an authentication accuracy and an usa...

2016
Avinatan Hassidim Yossi Matias Moti Yung

Bluetooth Low Energy (BLE) beacons broadcast their presence in order to enable proximity-based applications by observer devices. This results in a privacy and security exposure: broadcast devices are typically susceptible to tracking and spoofing based on the IDs used by the beacons. We introduce a scheme consisting of cloud-based Ephemeral Identifiers (EID) which allows only authorized parties...

2005
Jahwan Koo Seong-Jin Ahn Younghwan Lim Youngsong Mun

Sometimes network resources including IP address, MAC address, and hostname could be misused for the weakness of TCP/IP protocol suite and the deficiency of network management. Therefore, there is urgent need to solve the problems from the viewpoint of network management and operation. In this paper, we propose a network network blocking algorithm based on ARP spoofing and evaluate the robustne...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید