Vulnerability analysis of secure USB: based on the fingerprint authentication of product B
Abstract
References
Index Terms
- Vulnerability analysis of secure USB: based on the fingerprint authentication of product B
Recommendations
Comprehensive and Improved Secure Biometric System Using Homomorphic Encryption
Revised Selected Papers of the 10th International Workshop on Data Privacy Management, and Security Assurance - Volume 9481With the widespread development of biometric systems, concerns about security and privacy are increasing. An active area of research is template protection technology, which aims to protect registered biometric data. We focus on a homomorphic encryption ...
Supporting automated vulnerability analysis using formalized vulnerability signatures
ASE '12: Proceedings of the 27th IEEE/ACM International Conference on Automated Software EngineeringAdopting publicly accessible platforms such as cloud computing model to host IT systems has become a leading trend. Although this helps to minimize cost and increase availability and reachability of applications, it has serious implications on ...
Security analysis and enhancements of a multi-factor biometric authentication scheme
The security of authentication scheme, especially multi-factor biometric authentication scheme based on password, smart card, and biometric in wireless communication is an important and significant issue that researchers have been focusing on lately. ...
Comments
Information & Contributors
Information
Published In
- Conference Chair:
- Chih-Cheng Hung,
- General Chair:
- Lamjed Ben Said
Sponsors
In-Cooperation
- KISM: Korean Institute of Smart Media
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Funding Sources
- Korea government (MSIT)
- Ministry of Education
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 90Total Downloads
- Downloads (Last 12 months)11
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in