The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The adoption of Cloud computing involves many advantages in terms of flexibility, scalability and reliability, but also implies new challenges on security, data privacy and protection of personal data. Since more and more sensitive applications and data are moved to the cloud, the verification of the digital identity of the participants in the electronic communication has become a crucial challenge...
This paper presents a new approach to user identity currently being explored within the SuperIdentity project and outlines the specific role that biometric measurements can contribute towards a modelling process. The SuperIdentity project aims to define a novel holistic model wherein the proven strengths of relationships between facets of identity are mapped. These facets are drawn from both real...
The focus of this keynote is to introduce the biometric-based physical access system design approach, which allows for the thwarting of various attacks. Building a model of the attack to make predictions concerning the behavior of the system under study is the first step in designing a biometric system. In such models, effects of attacks are studied by monitoring symptoms of the attacks. For the modeling...
Federated identity management system interconnects distributed island of identity management systems with federated identity standards with single sign-on facility. In an open environment, such as those of a federated identity management system a user single sign-on credentials, can easily fall prey to identity theft, or unlawful information gathering. It may use either existing account or new account...
This project aims to solve the problems of identity authentication of users in online tests. The project integrates a biometric identification module based on techniques of fingerprint recognition in the educational communities and learning management systems where most of the courses for distance education are held. The project aims to cover all the weaknesses that traditionally have the password...
Despite the widespread success of online banking, there remains a reluctance to use it primarily because of uncertainty and security concerns. This study evaluates the potential of biometric authentication for online banking (b-banking) as a way of improving adoption and use of online banking. To this end, we extend Davis's core TAM model adding self-efficacy and user perceptions of biometric security...
Biometric recognition refers to an automatic recognition of individuals based on a feature vectors derived from their physiological and behavioral characteristic. In this paper proposed a new fingerprint recognition method on the bases of graph model.
Biometric technology has been adopted in important elements of the national infrastructure, such as electronic passports and immigration control systems. However, the threats of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. We introduce nine telebiometrics authentication models and a biometric...
Even though iris-based systems have proven to be very promising in a world where security is crucial, surprisingly enough, this means of authentication has not been given a very warm welcome from the users. In order to appropriately confront this issue, critical success factors of the deployment of networked-based systems for iris authentication - namely technical, human, and implementation aspects,...
In this paper, we present a new and efficient biometric identity based encryption scheme (BIO-IBE) using the Sakai Kasahara key construction and prove its security in the random oracle model based on the well-exploited k-BDHI computational problem. Our new scheme achieves better efficiency in terms of the key generation and decryption algorithms compared to the existing fuzzy IBE schemes. The main...
On the basis of security analysis on biometrics mechanism and realization, in the view of system security, this paper studies and discusses the security of biometrics completely and deeply, especially to make a deep analysis on biometrics unity, uniqueness and across-system replay attack, so as to put forward a biometrics security model.
Biometrics-based authentication systems are being increasingly used to control physical access to high-security facilities. In the case of biometrics authentication through an open network, there are many vulnerabilities which need to be addressed. After analyzing the possible vulnerabilities of a biometrics-based network authentication system, this paper presents a biometrics-based network authentication...
In this paper, it introduced the work theory of biometric identification technology and biometric identification system, discussed the disadvantages of single biometric feature identification technology and advantages of multi-biometric feature identification technology. It gave out the integration method and integration framework of multi-biometric features identification authentication system, and...
The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. For this reason, confidence...
The use of biometric features for authentication, obviously, requires privacy policies and usability solutions. In this work an online signature authentication with cryptographic zero knowledge protocol is proposed. In order to avoid storing the biometric key in whatever medium, the key is used as a private key for Schnorr protocol which employs a zero knowledge scheme and then destroyed.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.