نتایج جستجو برای: spoofing order
تعداد نتایج: 910816 فیلتر نتایج به سال:
An increasing number of independent studies have confirmed the vulnerability of automatic speaker verification (ASV) technology to spoofing. However, in comparison to that involving other biometric modalities, spoofing and countermeasure research for ASV is still in its infancy. A current barrier to progress is the lack of standards which impedes the comparison of results generated by different...
This white paper discusses methods and findings from one of Novetta’s many approaches to vulnerability assessment: the fabrication of non-gelatinous artifacts for capacitive fingerprint sensors. We present methods of evaluating artifact performance relative to that of live presentations and gummy fingerprint artifacts. Two sets of artifacts are comprised of latex face paint or acrylic fabric pa...
.................................................................................................................................... I ACKNOWLEDGMENT.................................................................................................................II Table Of
The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consi...
Shim6 is an important multihoming solution. This paper studies shim6 from several perspectives, including shim6 protocol implementation, shim6 mechanism optimization and security enhancement. In order to provide a shim6 research platform, we implement shim6 protocol on the Linux 2.6 platform as one of the first reference implementations. Based on this research platform, we refine the shim6 addr...
As computer systems become more pervasive and complex, security is increasingly important. Secure Transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. Many secure transmission methods require a type of encryption. Secure transmissions are put in place to prevent attacks such as ARP spoofing and general data loss. Hence, in order to p...
Viruses, Trojan horses, worms, back doors, spoofing, DoS attacks, and other cyber-security threats are now part of everyone’s computer vocabulary. What’s next? For all of its promise, the Internet of Things is likely to become the greatest challenge for security technology to date, defying conventional security solutions, paradigms, and tools. The Internet of Things is a global revolution in wh...
Biometric authentication technologies, such as fingerprint, face, iris, and vein, have been widespread in many applications from individual portable devices to national ID management systems. Furthermore, relatively newer biometric authentication modalities including eye movement, lip-motion, etc., have been also researched and developed in order to improve an authentication accuracy and an usa...
Bluetooth Low Energy (BLE) beacons broadcast their presence in order to enable proximity-based applications by observer devices. This results in a privacy and security exposure: broadcast devices are typically susceptible to tracking and spoofing based on the IDs used by the beacons. We introduce a scheme consisting of cloud-based Ephemeral Identifiers (EID) which allows only authorized parties...
Sometimes network resources including IP address, MAC address, and hostname could be misused for the weakness of TCP/IP protocol suite and the deficiency of network management. Therefore, there is urgent need to solve the problems from the viewpoint of network management and operation. In this paper, we propose a network network blocking algorithm based on ARP spoofing and evaluate the robustne...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید