For applications like Terrorist Watch Lists and Smart Guns, a false rejection is more critical than a false acceptance. In this paper a new threat model focusing on false rejections is presented, and the ©standard© architecture of a biometric system is extended by adding components like crypto, audit logging, power, and environment to increase the analytic power of the threat model. Our threat model gives new insight into false rejection attacks, emphasizing the role of an external attacker. The threat model is intended to be used during the design of a system. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Buhan, I., Bazen, A., Hartel, P., & Veldhuis, R. (2006). A false rejection oriented threat model for the design of biometrie authentication systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3832 LNCS, pp. 728–736). https://doi.org/10.1007/11608288_97
Mendeley helps you to discover research relevant for your work.