Current challenges for IT security with focus on biometry

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we give a survey of biometrical applications in security context. We start with a brief overview of the different biometric modalities which are most frequently used and compare their security contribution with classical cryptographic primitives. We then consider the case of fingerprints when used as password surrogates. We discuss the main security concerns of biometry in more detail on this practical example and make a point that the false accept error probability should be considered as the de facto measure of security.

Cite

CITATION STYLE

APA

Tams, B., Rassias, M. T., & Mihailescu, P. (2015). Current challenges for IT security with focus on biometry. In Computation, Cryptography, and Network Security (pp. 461–491). Springer International Publishing. https://doi.org/10.1007/978-3-319-18275-9_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free