Biometric systems identify users based on behavioral or physiological characteristics. The advantages of such systems over traditional authentication methods such as passwords are...
: The privacy and data protection challenges posed by biometric systems have been discussed in detail in the last years. Both security opportunities and privacy risks however may d...
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...