Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Koen Simoens"'
Publikováno v:
Acm Computing Surveys, 49(4):61. Association for Computing Machinery (ACM)
ACM Computing Surveys, 49, 4, pp. 1-35
ACM Computing Surveys, 49, 1-35
Kiljan, S, Simoens, K, De Cock, D, Van Eekelen, M & Vranken, H 2017, ' A Survey of Authentication and Communications Security in Online Banking ', Acm Computing Surveys, vol. 49, no. 4, 61 . https://doi.org/10.1145/3002170
ACM Computing Surveys, 49, 4, pp. 1-35
ACM Computing Surveys, 49, 1-35
Kiljan, S, Simoens, K, De Cock, D, Van Eekelen, M & Vranken, H 2017, ' A Survey of Authentication and Communications Security in Online Banking ', Acm Computing Surveys, vol. 49, no. 4, 61 . https://doi.org/10.1145/3002170
A survey was conducted to provide a state of the art of online banking authentication and communications security implementations. Between global regions the applied (single or multifactor) authentication schemes differ greatly, as well as the securi
Publikováno v:
Designs, Codes and Cryptography. 62:1-18
We investigate generic methods to find near-collisions in cryptographic hash functions. We introduce a new generic approach based on methods to find cycles in the space of codewords of a code with low covering radius. We give an analysis of our appro
Publikováno v:
Computer Law & Security Review. 25:415-431
Now that more and more legal transactions are being performed online, it is increasingly necessary to enable integration of legal mandates within identity and information management systems. The purpose of this article is to outline the legal framewo
Publikováno v:
Information Security Technical Report. 13:54-60
Efficient eGovernment and eCommerce require the ability to authenticate citizens and transactions online, whereas the increasing mobility of citizens demands reliable identification. Identity documents tend to become the most popular form of identity
Autor:
Bart Preneel, Elaine M. Newton, Filipe Beato, Bian Yang, Koen Simoens, Christoph Busch, Xuebing Zhou
Publikováno v:
ICB
Traditional criteria used in biometric performance evaluation do not cover all the performance aspects of biometric template protection (BTP) and the lack of well-defined metrics inhibits the proper evaluation of such methods. Previous work in the li
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols with respect to user and data privacy. The goal of an adversary in such context is not to bypass the authentication but to learn information either on biomet
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::645d4ecbefba76a1ddaaf7013a620807
https://www.cosic.esat.kuleuven.be/publications/article-1539.pdf
https://www.cosic.esat.kuleuven.be/publications/article-1539.pdf
Publikováno v:
IIH-MSP
We analyze the security of biometric template protection methods that involve trusted hardware. The methods are defined in the black box security model, i.e., we consider components that perform operations on the biometric data they contain and only
Publikováno v:
BTAS
In this paper we analyze the template protection method for minutiae-based fingerprint biometrics as proposed by Yang and Busch (BTAS 2009). This method is based on a self-aligning and non-invertible parameterized transformation that is applied to mi
Publikováno v:
BTAS
Random projection provides a good diversification effect for biometric template protection but is drawing increasing security concerns under the token-stolen (or public parameter) case. We propose a dynamic random projection method to alleviate these
Publikováno v:
IIH-MSP
The challenge in applying the known information theoretical measures for biometric authentication systems is that on one hand these measures are defined in a specific context and on the other hand there are several constructions known for the protect
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::96b5509cf065d0b8934a393455e2eeaa