Montecchi et al., 2012 - Google Patents
Quantitative security evaluation of a multi-biometric authentication systemMontecchi et al., 2012
View PDF- Document ID
- 7681034513648778146
- Author
- Montecchi L
- Lollini P
- Bondavalli A
- La Mattina E
- Publication year
- Publication venue
- International Conference on Computer Safety, Reliability, and Security
External Links
Snippet
Biometric authentication systems verify the identity of users by relying on their distinctive traits, like fingerprint, face, iris, signature, voice, etc. Biometrics is commonly perceived as a strong authentication method; in practice several well-known vulnerabilities exist, and …
- 238000011156 evaluation 0 title abstract description 16
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Montecchi et al. | Quantitative security evaluation of a multi-biometric authentication system | |
| Chung et al. | Game theory with learning for cyber security monitoring | |
| US20080222706A1 (en) | Globally aware authentication system | |
| Alomar et al. | Social authentication applications, attacks, defense strategies and future research directions: a systematic review | |
| CN103944722A (en) | Identification method for user trusted behaviors under internet environment | |
| Deshpande et al. | An evaluation of authentication technologies for web-based wireless network security | |
| JP2017509072A (en) | Security evaluation system and method | |
| Hettiarachchige et al. | Holistic authentication framework for virtual agents; UK banking industry | |
| CN110807187A (en) | Block chain-based network market illegal information evidence storing method and platform terminal | |
| Jain et al. | CAVEAT: credit card vulnerability exhibition and authentication tool | |
| CN114465759A (en) | Trust level evaluation method and device, electronic equipment and storage medium | |
| Alqahtani et al. | Reviewing of cybersecurity threats, attacks, and mitigation techniques in cloud computing environment | |
| Hossain et al. | How secure is ai-based coding?: A security analysis using stride and data flow diagrams | |
| Noureddine et al. | Accounting for the human user in predictive security models | |
| Chinchani et al. | Target-Centric Formal Model For Insider Threat And More | |
| Tellini et al. | Two-Factor Authentication: Selecting and implementing a two-factor authentication method for a digital assessment platform | |
| Sheik et al. | Considerations for secure mosip deployment | |
| Schiavone et al. | Continuous authentication and non-repudiation for the security of critical systems | |
| He et al. | Understanding mobile banking applications’ security risks through blog mining and the workflow technology | |
| Canino et al. | A cost-effective solution leveraging public blockchain for massively sharing malware signatures | |
| Najat et al. | Comparative study of the Security Analysis of IoT systems using attack trees algorithm | |
| Chauhan et al. | Adaptive Authentication Using Machine Learning | |
| Andress | Foundations of Information Security | |
| Wairagade | Role of Identity and Access Management in Corporate Management | |
| Majdalawieh et al. | Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking |