Threats models on biometri systems: A comparative study

Dellys Nabil, Benatchba Karima, Koudil Mouloud, Ahmed Bouridane

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

3 Citations (Scopus)

Abstract

Several biometric threats systems models have been proposed to facilitate the design, implementation and validation techniques for securing these systems. Some models classify threats by type of attacks, others by specific attacks and other by using vulnerabilities and threat agent. Each model proposes a vision and a different approach to identify these threats. For example, to design security techniques for wireless biometric card, one should identify all threats facing this kind of device. In this paper, a comparative study and synthesis to help choose the most fitting model, depending on the security problems addressed, is given.
Original languageEnglish
Title of host publicationComputational Aspects of Social Networks (CASoN), 2012 Fourth International Conference on
Place of PublicationPiscataway, NJ
PublisherIEEE
Pages186-191
ISBN (Print)978-1-4673-4793-8
DOIs
Publication statusPublished - 2012

Fingerprint Dive into the research topics of 'Threats models on biometri systems: A comparative study'. Together they form a unique fingerprint.

Cite this