Network security (volume 2, number 3)
- Publisher
- Elsevier Science
- Year
- 1999
- Tongue
- English
- Weight
- 85 KB
- Volume
- 4
- Category
- Article
- ISSN
- 1363-4127
No coin nor oath required. For personal study only.
โฆ Synopsis
The Verisign machine worked on the invisible timing and rhythm features of the act of handwriting so-called Dynamic' signature verification.
Prediction of the future in any field is difficult. There are some things I would hke to happen in biometrics. One of these is the application of the Turing Test to biometrics development and evaluation.
The Turing test approach comes in to play in a number of ways. For example, today's biometric machines are sometimes deceived by various artefacts. Similar Turing Testable attacks are possible with other biometric characteristics and behavioural traits.
๐ SIMILAR VOLUMES
Chief Security officers are rising to the challenge of defining metrics for network security to help justify security spend in the boardroom. CSOs from Motorola, Macromedia and McKesson Corp have forged the Security Metrics Consortium to define standardized real-world security risk metrics to presen
Over the last few years computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management deci
Ultraviolet-absorbing/screening substances in cyanobacteria, phytoplankton and macroalgae..