Deliverables
List of deliverables. Some deliverables are public and available for consultation on this web page when they will be completed. The month 1 is November 2010.
Del. n° |
Deliverable name | Due date (month) |
Status | Publicly available |
---|---|---|---|---|
D1.1 | Consortium agreement | 1 | Completed | No |
D1.2 | Annual report | 12 | Completed | No |
D1.3 | Annual report | 24 | Completed | No |
D1.4 | Annual report | 36 | Submitted | No |
D1.5 | Final report | 42 | No | |
D2.1 | Definition of use cases | 6 | Completed | No |
D2.2 | Specifications of biometric databases and systems | 6 | Completed | Yes |
D2.3 | Specifications of spoofing attacks | 9 | Completed | No |
D2.4 | ICAO biometric databases of spoofing attacks | 16 | Completed | Yes |
D2.5 | Non-ICAO biometric databases of spoofing attacks | 16 | Completed | Yes |
D3.1 | Evaluation of baseline ICAO biometric systems | 11 | Completed | Yes |
D3.2 | Evaluation of baseline non-ICAO biometric systems | 11 | Completed | Yes |
D3.3 | Evaluation of baseline ICAO biometric systems under spoofing attacks | 18 | Completed | No |
D3.4 | Evaluation of baseline non-ICAO systems under spoofing attacks | 21 | Completed | No |
D4.1 | Evaluation of initial ICAO countermeasures for spoofing attacks | 23 | Completed | No |
D4.2 | Evaluation of initial non-ICAO countermeasures for spoofing attacks | 25 | Completed | No |
D4.3 | Evaluation of advanced ICAO countermeasures for spoofing attacks | 30 | Completed | No |
D4.4 | Evaluation of advanced non-ICAO countermeasures for spoofing attacks | 33 | Completed | No |
D5.1 | Planning for dissemination activities | 5 | Submitted | Yes |
D5.2 | Exploitation plans | 14 | Completed | No |
D5.3 | First revised exploitation plans | 22 | Completed | No |
D5.4 | Intermediate dissemination activities | 23 | Completed | No |
D5.5 | Second revised exploitation plans | 35 | Completed | No |
D5.6 | Final dissemination activities | 38 | Completed | Yes |
D5.7 | Standards for security evaluation under spoofing attacks | 40 | Completed | Yes |
D5.8 | Report on exploitation activities | 41 | Completed | No |
D6.1 | API for countermeasures integration | 20 | Completed | No |
D6.2 | Evaluation of integrated systems with initial countermeasures | 34 | Completed | No |
D6.3 | Evaluation of integrated systems with advanced countermeasures | 41 | Completed | No |
D7.1 | Environmental scanning report | 6 | Completed | Yes |
D7.2 | Interviews report | 16 | Completed | Yes |
D7.3 | Ethical monitoring report (intermediary) | 18 | Completed | No |
D7.4 | Workshop report | 20 | Completed | No |
D7.5 | Ethical guidelines | 32 | Completed | Yes |
D7.6 | Ethical monitoring report (final) | 35 | Completed | Yes |