2015 Sixth International Conference on Emerging Security Technologies (EST) 2015
DOI: 10.1109/est.2015.18
|View full text |Cite
|
Sign up to set email alerts
|

Taxonomy and Modeling of Impersonation in e-Border Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(17 citation statements)
references
References 11 publications
0
17
0
Order By: Relevance
“…3) Risk and trust propagation. For example, if a person is on a watchlist, the risk of mis-identification or impersonation [61] is propagated through other states such as rik of misdetection of a concealed item. The risk propagation problem was studied, in particular, as a multi-echelon supply chain problem in [40].…”
Section: Fundamental Operations On Risk and Trustmentioning
confidence: 99%
See 1 more Smart Citation
“…3) Risk and trust propagation. For example, if a person is on a watchlist, the risk of mis-identification or impersonation [61] is propagated through other states such as rik of misdetection of a concealed item. The risk propagation problem was studied, in particular, as a multi-echelon supply chain problem in [40].…”
Section: Fundamental Operations On Risk and Trustmentioning
confidence: 99%
“…Computing the risk and trust under identity uncertainty has only been so far, partially studies. For example, effects of impersonation were studied in [61]. The risk countermeasures were studied in [6].…”
Section: Introductionmentioning
confidence: 99%
“…The phenomenon of impersonation (passive or zero-effort attack) has been experimentally detected in speech recognition by Doddington et al [36] and in other forms of biometric modalities [37][38][39]. Unfortunately, not only are passive attacks an inherent property of watchlist technology, impersonation from other sources, such as social networks, can also influence the reliability of the watchlist [40,41]. One possible mitigation method for impersonation is the use of multiple biometrics [26].…”
Section: Literature Reviewmentioning
confidence: 99%
“…1. Sources of personal information, such as national and international databases [2] and virtual sources (media and social networks) [37,41,70].…”
Section: Definitionmentioning
confidence: 99%
See 1 more Smart Citation