Attack Vectors in Biometric Recognition Systems - Mobile Authentication Use Case, Blockchain, and More

Attack Vectors in Biometric Recognition Systems - Mobile Authentication Use Case, Blockchain, and More

LASCON via YouTube Direct link

Product Roadmaps

11 of 33

11 of 33

Product Roadmaps

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Attack Vectors in Biometric Recognition Systems - Mobile Authentication Use Case, Blockchain, and More

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Biometric Enrollment
  3. 3 Terms
  4. 4 Presentation
  5. 5 Vulnerabilities
  6. 6 Presentation Attacks
  7. 7 Black Hat USA 2015
  8. 8 Warmup slides
  9. 9 Contest
  10. 10 Mobile Top 10
  11. 11 Product Roadmaps
  12. 12 Liveness Detection
  13. 13 USAA
  14. 14 Biometric Standards
  15. 15 Virtual Reality
  16. 16 Tabula Rasa
  17. 17 Alternatives
  18. 18 Algorithms
  19. 19 Multiple Heartbeats
  20. 20 Template Protection
  21. 21 Biometric Encryption
  22. 22 Biometric Templates
  23. 23 ID20 Project
  24. 24 IBM Hyper Ledger
  25. 25 TSA Interpol
  26. 26 Concerns
  27. 27 Blockchain
  28. 28 Risk
  29. 29 ACM Magazine
  30. 30 Adaptive Storage
  31. 31 Brain Waves
  32. 32 Cloaking
  33. 33 Separation of Duties

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.