This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Attack 5: Matcher is replaced by a Trojan horse program It produces scores chosen by the attacker Attack 6: Templates in the database are modified, removed, or new templates are added Attack 7: The transferred template information is altered in the communication channel Attack 8: The matching result (e.g., accept/reject) is overridden...
View Full Document
This document was uploaded on 11/03/2011 for the course BIOLOGY BSC1105 at Broward College.
- Fall '10