Nabil, Dellys, Karima, Benatchba, Mouloud, Koudil and Bouridane, Ahmed (2012) Threats models on biometri systems: A comparative study. In: Computational Aspects of Social Networks (CASoN), 2012 Fourth International Conference on. IEEE, Piscataway, NJ, pp. 186-191. ISBN 978-1-4673-4793-8
Full text not available from this repository. (Request a copy)Abstract
Several biometric threats systems models have been proposed to facilitate the design, implementation and validation techniques for securing these systems. Some models classify threats by type of attacks, others by specific attacks and other by using vulnerabilities and threat agent. Each model proposes a vision and a different approach to identify these threats. For example, to design security techniques for wireless biometric card, one should identify all threats facing this kind of device. In this paper, a comparative study and synthesis to help choose the most fitting model, depending on the security problems addressed, is given.
Item Type: | Book Section |
---|---|
Uncontrolled Keywords: | attack, biometric, model, threat, vulnerabilities |
Subjects: | G400 Computer Science |
Department: | Faculties > Engineering and Environment > Computer and Information Sciences |
Depositing User: | Becky Skoyles |
Date Deposited: | 21 Jan 2015 12:34 |
Last Modified: | 12 Oct 2019 22:29 |
URI: | http://nrl.northumbria.ac.uk/id/eprint/20747 |
Downloads
Downloads per month over past year