Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M. Rejman-Greene, Security considerations in the use of biometric devices. Inf. Secur. Tech. Rep. 3, 77–80 (1998)
N.K. Ratha, J.H. Connell, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)
C. Roberts, Biometric attack vectors and defences. Comput. Secur. 26(1), 14–25 (2007)
C. Criteria, Biometric evaluation methodology supplement (BEM). Common methodology for information technology security evaluation (2002), http://www.cesg.gov.uk/site/ast/biometrics/media/BEM_10.pdf
A. Matthews, Side-channel attacks on smartcards. Netw. Secur. 2006(12), 18–20 (2006)
R. Sanchez-Reillo, Achieving security in integrated circuit card applications: reality or desire? IEEE Aerosp. Electron. Syst. Mag. 17, 4–8 (2002)
R. Sanchez-Reillo, A. Gonzalez-Marcos, Access control system with hand geometry verification and smart cards. IEEE Aerosp. Electron. Syst. Mag. 15(2), 45–48 (2000). doi:10.1109/62.825671
R. Sanchez-Reillo, Smart card information and operations using biometrics. IEEE Aerosp. Electron. Syst. Mag. 16(4), 3–6 (2001). doi:10.1109/62.918014
ISO/IEC_JTC1/SC17, ISO/IEC 7816 Parts 3, 4, 8, 9 & 11 (1987–2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media New York
About this entry
Cite this entry
Sanchez-Reillo, R. (2015). Tamper-Proof Operating System. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_291
Download citation
DOI: https://doi.org/10.1007/978-1-4899-7488-4_291
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4899-7487-7
Online ISBN: 978-1-4899-7488-4
eBook Packages: Computer ScienceReference Module Computer Science and Engineering