Articles with "attacks countermeasures" as a keyword



Photo by henry_be from unsplash

BGP with BGPsec: Attacks and Countermeasures

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Network"

DOI: 10.1109/mnet.2018.1800171

Abstract: The BGP suffers from numerous security vulnerabilities, for example, fake routing updates incurring traffic hijacking and interception. The BGPsec protocol is supposed to fix these vulnerabilities by attesting routing updates. Although the BGP security problem… read more here.

Keywords: bgp bgpsec; bgpsec attacks; bgpsec; bgp ... See more keywords
Photo from wikipedia

Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2022.3162623

Abstract: Based on the Threshold Predicate Encryption (TPE), the biometric authentication scheme PassBio aims to correctly authenticate genuine end-users without leaking their biometric privacy information. However, this article proposes two impersonation attacks to PassBio by merely… read more here.

Keywords: authentication; biometric authentication; countermeasures privacy; privacy preserving ... See more keywords