A false rejection oriented threat model for the design of biometrie authentication systems

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

For applications like Terrorist Watch Lists and Smart Guns, a false rejection is more critical than a false acceptance. In this paper a new threat model focusing on false rejections is presented, and the ©standard© architecture of a biometric system is extended by adding components like crypto, audit logging, power, and environment to increase the analytic power of the threat model. Our threat model gives new insight into false rejection attacks, emphasizing the role of an external attacker. The threat model is intended to be used during the design of a system. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Buhan, I., Bazen, A., Hartel, P., & Veldhuis, R. (2006). A false rejection oriented threat model for the design of biometrie authentication systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3832 LNCS, pp. 728–736). https://doi.org/10.1007/11608288_97

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free