Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Network"
DOI: 10.1109/mnet.2018.1800171
Abstract: The BGP suffers from numerous security vulnerabilities, for example, fake routing updates incurring traffic hijacking and interception. The BGPsec protocol is supposed to fix these vulnerabilities by attesting routing updates. Although the BGP security problem…
read more here.
Keywords:
bgp bgpsec;
bgpsec attacks;
bgpsec;
bgp ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2022.3162623
Abstract: Based on the Threshold Predicate Encryption (TPE), the biometric authentication scheme PassBio aims to correctly authenticate genuine end-users without leaking their biometric privacy information. However, this article proposes two impersonation attacks to PassBio by merely…
read more here.
Keywords:
authentication;
biometric authentication;
countermeasures privacy;
privacy preserving ... See more keywords