Read the interview released in the enterprise security magazine about biometric authentication
Read the interview released in the enterprise security magazine about biometric authentication
Face Anti Spoofing In the recent times as biometric recognition systems increase their performance, IT Managers have to take in great consideration possible direct attack; potential intruders may gain access to the IT system by directly interacting with the system input device, like a normal user would. Such attempts are referred as spoofing attacks. Our […]
Biometrics and Cryptography : The biometric Password Biometrics provide a person with unique characteristics which are always there. Can they be used as a cryptographic key? First of all we can define Conventional cryptography a methodology based on encryption keys, which are just bit strings long enough, usually 128 bit or more. These […]
Recent Comments