Learn More
In this paper, we propose a theoretical framework to construct matching algorithms for any biometric authentication systems. Conventional matching algorithms are not necessarily secure against strong intentional impersonation attacks such as wolf attacks. The wolf attack is an attempt to impersonate a genuine user by presenting a " wolf " to a biometric(More)
This paper gives the formal definitions for security metrics proposed by Simoens et al.[11] and Nagar et al.[1], and analyze the relations. [11] defined comprehensive metrics for all biometric template protection algorithms. Their security-related metrics are defined as the measurement of performance in various setting. Whereas [1] also defined similar but(More)
—Recently Radio Frequency IDentification (RFID) systems are used in many applications. However an individual identification scheme using RFID tags has a serious problem that if there are many tags within the reader's operation range, then the reader can not determine a genuine tag of a user to be authenticated, the identification protocol is executed for(More)
This manuscript has been published without reviewing and editing as received from the authors: posting the manuscript to SCIS 2009 does not prevent future submissions to any journals or conferences with proceedings. Abstract— In [4], we proposed a theoretical framework to construct matching algorithms for any biometric authentication systems. In this paper,(More)
  • 1