๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Network security (volume 2, number 3)


Publisher
Elsevier Science
Year
1999
Tongue
English
Weight
85 KB
Volume
4
Category
Article
ISSN
1363-4127

No coin nor oath required. For personal study only.

โœฆ Synopsis


The Verisign machine worked on the invisible timing and rhythm features of the act of handwriting so-called Dynamic' signature verification.

Prediction of the future in any field is difficult. There are some things I would hke to happen in biometrics. One of these is the application of the Turing Test to biometrics development and evaluation.

The Turing test approach comes in to play in a number of ways. For example, today's biometric machines are sometimes deceived by various artefacts. Similar Turing Testable attacks are possible with other biometric characteristics and behavioural traits.


๐Ÿ“œ SIMILAR VOLUMES


Network security needs numbers say CSOs
๐Ÿ“‚ Article ๐Ÿ“… 2004 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 146 KB

Chief Security officers are rising to the challenge of defining metrics for network security to help justify security spend in the boardroom. CSOs from Motorola, Macromedia and McKesson Corp have forged the Security Metrics Consortium to define standardized real-world security risk metrics to presen

Managing Network Security โ€” Part 3: Netw
โœ Fred Cohen ๐Ÿ“‚ Article ๐Ÿ“… 1997 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 483 KB

Over the last few years computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management deci

Contents Volume 47, Numbers 2โ€“3
๐Ÿ“‚ Article ๐Ÿ“… 1998 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 126 KB

Ultraviolet-absorbing/screening substances in cyanobacteria, phytoplankton and macroalgae..