Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
3Activity
0 of .
Results for:
No results containing your search query
P. 1
India's Unique ID project: Biometrics Vulnerabilities & Exploits

India's Unique ID project: Biometrics Vulnerabilities & Exploits

Ratings: (0)|Views: 167 |Likes:
Published by anivar_aravind
Biometrics Vulnerabilities & Exploits

Jtd1959@gmail.com

INTRODUCTION • Old World methods of trust and authentication – Personal introductions, documents – Key role player is the authenticator • New World requirements – Annonymous, large scale, short term relationships – Key requirement is building up of trust • No defence mechanisms of older methods present in newer systems

Authentication by Technology • Requires the exchange of certain FACTORS • Requires an authority who can verify these f
Biometrics Vulnerabilities & Exploits

Jtd1959@gmail.com

INTRODUCTION • Old World methods of trust and authentication – Personal introductions, documents – Key role player is the authenticator • New World requirements – Annonymous, large scale, short term relationships – Key requirement is building up of trust • No defence mechanisms of older methods present in newer systems

Authentication by Technology • Requires the exchange of certain FACTORS • Requires an authority who can verify these f

More info:

Published by: anivar_aravind on Aug 26, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as ODP, PDF, TXT or read online from Scribd
See more
See less

08/28/2013

pdf

text

original

 
 
BiometricsVulnerabilities & Exploits
 Jtd1959@gmail.com
 
 
INTRODUCTION
Old World methods of trust andauthentication –Personal introductions, documents –Key role player is the
authenticator 
New World requirements –Annonymous, large scale, short termrelationships –Key requirement is building up of 
trust 
No defence mechanisms of older methodspresent in newer systems
 
 
Authentication by Technology
Requires the exchange of certainFACTORSRequires an authority who can verify thesefactorsRequires an authority who can providepermission to build a relationship andtransact

Activity (3)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Prasanth Smvk liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->