[go: up one dir, main page]

Montecchi et al., 2012 - Google Patents

Quantitative security evaluation of a multi-biometric authentication system

Montecchi et al., 2012

View PDF
Document ID
7681034513648778146
Author
Montecchi L
Lollini P
Bondavalli A
La Mattina E
Publication year
Publication venue
International Conference on Computer Safety, Reliability, and Security

External Links

Snippet

Biometric authentication systems verify the identity of users by relying on their distinctive traits, like fingerprint, face, iris, signature, voice, etc. Biometrics is commonly perceived as a strong authentication method; in practice several well-known vulnerabilities exist, and …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Montecchi et al. Quantitative security evaluation of a multi-biometric authentication system
Chung et al. Game theory with learning for cyber security monitoring
US20080222706A1 (en) Globally aware authentication system
Alomar et al. Social authentication applications, attacks, defense strategies and future research directions: a systematic review
CN103944722A (en) Identification method for user trusted behaviors under internet environment
Deshpande et al. An evaluation of authentication technologies for web-based wireless network security
JP2017509072A (en) Security evaluation system and method
Hettiarachchige et al. Holistic authentication framework for virtual agents; UK banking industry
CN110807187A (en) Block chain-based network market illegal information evidence storing method and platform terminal
Jain et al. CAVEAT: credit card vulnerability exhibition and authentication tool
CN114465759A (en) Trust level evaluation method and device, electronic equipment and storage medium
Alqahtani et al. Reviewing of cybersecurity threats, attacks, and mitigation techniques in cloud computing environment
Hossain et al. How secure is ai-based coding?: A security analysis using stride and data flow diagrams
Noureddine et al. Accounting for the human user in predictive security models
Chinchani et al. Target-Centric Formal Model For Insider Threat And More
Tellini et al. Two-Factor Authentication: Selecting and implementing a two-factor authentication method for a digital assessment platform
Sheik et al. Considerations for secure mosip deployment
Schiavone et al. Continuous authentication and non-repudiation for the security of critical systems
He et al. Understanding mobile banking applications’ security risks through blog mining and the workflow technology
Canino et al. A cost-effective solution leveraging public blockchain for massively sharing malware signatures
Najat et al. Comparative study of the Security Analysis of IoT systems using attack trees algorithm
Chauhan et al. Adaptive Authentication Using Machine Learning
Andress Foundations of Information Security
Wairagade Role of Identity and Access Management in Corporate Management
Majdalawieh et al. Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking