Garofalo et al., 2024 - Google Patents
A Novel Evaluation Framework for Biometric Security: Assessing Guessing Difficulty as a MetricGarofalo et al., 2024
- Document ID
- 13094265344714918876
- Author
- Garofalo G
- Rúa E
- Preuveneers D
- Joosen W
- et al.
- Publication year
- Publication venue
- IEEE Transactions on Information Forensics and Security
External Links
Snippet
Biometric authentication systems have traditionally relied on the False Match Rate (FMR) to evaluate security against impersonation threats. However, this metric alone is insufficient for assessing vulnerabilities to statistical attacks because it cannot account for the non …
- 238000011156 evaluation 0 title abstract description 37
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thomas et al. | A broad review on non-intrusive active user authentication in biometrics | |
Krishnamoorthy et al. | Identification of user behavioral biometrics for authentication using keystroke dynamics and machine learning | |
Serwadda et al. | Examining a large keystroke biometrics dataset for statistical-attack openings | |
Buschek et al. | Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices | |
Zhong et al. | A survey on keystroke dynamics biometrics: approaches, advances, and evaluations | |
Wang et al. | Improving reliability: User authentication on smartphones using keystroke biometrics | |
Rúa et al. | On the security of biometrics and fuzzy commitment cryptosystems: A study on gait authentication | |
Mondal et al. | Continuous authentication and identification for mobile devices: Combining security and forensics | |
Arman et al. | A comprehensive survey for privacy-preserving biometrics: Recent approaches, challenges, and future directions | |
Rybnik et al. | An exploration of keystroke dynamics authentication using non-fixed text of various length | |
Saifan et al. | A Survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices | |
Yang et al. | Unsupervised sensor-based continuous authentication with low-rank transformer using learning-to-rank algorithms | |
Budžys et al. | Integrating deep learning and data fusion for advanced keystroke dynamics authentication | |
Garofalo et al. | A Novel Evaluation Framework for Biometric Security: Assessing Guessing Difficulty as a Metric | |
Sheng et al. | Reliable and secure encryption key generation from fingerprints | |
Stragapede et al. | BehavePassDB: Benchmarking mobile behavioral biometrics | |
Dash et al. | Privacy preserving unique identity generation from multimodal biometric data for privacy and security applications | |
Rudrakshi et al. | A model for secure information storage and retrieval on cloud using multimodal biometric cryptosystem | |
Pramana et al. | Keystroke dynamics for authentication using dynamic time warping | |
Van Hamme et al. | Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors | |
Dimaratos et al. | Evaluation Scheme to Analyze Keystroke Dynamics Methods | |
Baynath et al. | Improving Security Of Keystroke Dynamics By Increasing The Distance Between Keys | |
Abo-Alian et al. | Authentication as a service for cloud computing | |
Medvedev et al. | A decision-making framework for user authentication using keystroke dynamics | |
Bhargav-Spantzel et al. | Biometrics-based identifiers for digital identity management |