[HTML][HTML] A survey of emerging threats in cybersecurity

J Jang-Jaccard, S Nepal - Journal of computer and system sciences, 2014 - Elsevier
The exponential growth of the Internet interconnections has led to a significant growth of
cyber attack incidents often with disastrous and grievous consequences. Malware is the …

[图书][B] Introduction to biometrics

A Jain, R Bolle, S Pankanti - 1996 - Springer
Biometrics deals with identification of individuals based on their biological or behavioral
characteristics. Biometrics has lately been receiving attention in popular media, it is widely …

Biometric template security: Challenges and solutions

AK Jain, A Ross, U Uludag - 2005 13th European signal …, 2005 - ieeexplore.ieee.org
A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of
the authentication process. These attacks are intended to either circumvent the security …

A Review on the Mechanism Mitigating and Eliminating Internet Crimes using Modern Technologies: Mitigating Internet crimes using modern technologies

H Ibrahim - Wasit Journal of Computer and Mathematics …, 2022 - wjcm.uowasit.edu.iq
There is no doubting that contemporary technology creates new hazards, and these threats
are many and significant, directly harming people's lives and threatening their stability …

Privacy-preserving ECG classification with branching programs and neural networks

M Barni, P Failla, R Lazzeretti… - IEEE Transactions …, 2011 - ieeexplore.ieee.org
Privacy protection is a crucial problem in many biomedical signal processing applications.
For this reason, particular attention has been given to the use of secure multiparty …

Biometric template transformation: a security analysis

A Nagar, K Nandakumar… - Media Forensics and …, 2010 - spiedigitallibrary.org
One of the critical steps in designing a secure biometric system is protecting the templates of
the users that are stored either in a central database or on smart cards. If a biometric …

A framework for analyzing template security and privacy in biometric authentication systems

K Simoens, J Bringer, H Chabanne… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols
with respect to user and data privacy. The goal of an adversary in such context is not to …

A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates

M Barni, T Bianchi, D Catalano… - 2010 fourth IEEE …, 2010 - ieeexplore.ieee.org
The privacy protection of the biometric data is an important research topic, especially in the
case of distributed biometric systems. In this scenario, it is very important to guarantee that …

Review of key‐binding‐based biometric data protection schemes

D Sadhya, SK Singh, B Chakraborty - IET Biometrics, 2016 - Wiley Online Library
With the advent of modern technology, the use of biometric authentication systems has been
on the rise. The core of any biometric system consists of a database which contains the …

Theoretical and practical boundaries of binary secure sketches

J Bringer, H Chabanne, G Cohen… - IEEE Transactions …, 2008 - ieeexplore.ieee.org
Fuzzy commitment schemes, introduced as a link between biometrics and cryptography, are
a way to handle biometric data matching as an error-correction issue. We focus here on …