Sciweavers

107 search results - page 6 / 22
» Vulnerabilities in Biometric Encryption Systems
Sort
View
HICSS
2008
IEEE
135views Biometrics» more  HICSS 2008»
14 years 4 months ago
The Emerging Role of Vertical Search Engines in Travel Distribution: A Newly-Vulnerable Electronic Markets Perspective
Information technology (IT) advances often create turmoil and disturb existing industry structures. We analyze the impact of the Internet and e-commerce technologies on digital int...
Nelson F. Granados, Robert J. Kauffman, Bradley Ki...
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
14 years 3 months ago
CANDI: A System for Classifying the Security Risks in Network Appliances
Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user a...
Joseph G. Tront, Randy C. Marchany
ESORICS
2009
Springer
14 years 4 months ago
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem
Abstract. Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy...
Ileana Buhan, Jeroen Breebaart, Jorge Guajardo, Ko...
CCS
2011
ACM
12 years 9 months ago
Automated black-box detection of side-channel vulnerabilities in web applications
Web applications divide their state between the client and the server. The frequent and highly dynamic client-server communication that is characteristic of modern web application...
Peter Chapman, David Evans
ICPR
2006
IEEE
14 years 11 months ago
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme
We propose a novel biometrics cryptosystem where one can send and receive secure information using just the fingerprints. This cryptosystem is a judicious blend of the asymmetric ...
Abhishek Nagar, Santanu Chaudhury