Completed
Cloaking
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Attack Vectors in Biometric Recognition Systems - Mobile Authentication Use Case, Blockchain, and More
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Biometric Enrollment
- 3 Terms
- 4 Presentation
- 5 Vulnerabilities
- 6 Presentation Attacks
- 7 Black Hat USA 2015
- 8 Warmup slides
- 9 Contest
- 10 Mobile Top 10
- 11 Product Roadmaps
- 12 Liveness Detection
- 13 USAA
- 14 Biometric Standards
- 15 Virtual Reality
- 16 Tabula Rasa
- 17 Alternatives
- 18 Algorithms
- 19 Multiple Heartbeats
- 20 Template Protection
- 21 Biometric Encryption
- 22 Biometric Templates
- 23 ID20 Project
- 24 IBM Hyper Ledger
- 25 TSA Interpol
- 26 Concerns
- 27 Blockchain
- 28 Risk
- 29 ACM Magazine
- 30 Adaptive Storage
- 31 Brain Waves
- 32 Cloaking
- 33 Separation of Duties