Sciweavers

107 search results - page 13 / 22
» Vulnerabilities in Biometric Encryption Systems
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 4 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
MICRO
2003
IEEE
148views Hardware» more  MICRO 2003»
14 years 3 months ago
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation...
Jun Yang 0002, Youtao Zhang, Lan Gao
HICSS
2006
IEEE
105views Biometrics» more  HICSS 2006»
14 years 3 months ago
Unraveling Geographic Interdependencies in Electric Power Infrastructure
Interdependencies among infrastructure systems are now becoming commonplace, and present both opportunities and vulnerabilities. Initial attention was paid to functional interdepe...
Carlos E. Restrepo, Jeffrey S. Simonoff, Rae Zimme...
HICSS
2003
IEEE
211views Biometrics» more  HICSS 2003»
14 years 3 months ago
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to i...
Oleg Kachirski, Ratan K. Guha
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
14 years 1 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang