Filters








67 Hits in 1.9 sec

A Survey of System Security in Contactless Electronic Passports [article]

Anshuman Sinha
2010 arXiv   pre-print
It analyzes and describes the cryptographic protocols used in Basic Access Control (BAC) and Extended Access Control (EAC).  ...  This paper surveys the security mechanisms built into the firstgeneration of authentication mechanisms and compares them with second-generation passports.  ...  ACCESS CONTROL IN EPASSPORT SYSTEMS Access control using data stored in a secure chip is defined for various levels of classification by the issuing country.  ... 
arXiv:1011.2946v1 fatcat:a632gnz5ejbmxapgnwkcmcp6x4

Security Mechanisms and Access Control Infrastructure for Biometrics Passport using Cryptographic Protocols

V.K. Narendira Kumar, B. Srinivasan
2013 International Journal of Intelligent Systems and Applications  
The epassport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and biometrics (face, fingerprints, palm prints and iris).  ...  The paper explores the privacy and security implications of this impending worldwide experiment in biometrics authentication technology.  ...  Literature Survey Juels et al (2005) discussed security and privacy issues that apply to e-passports.  ... 
doi:10.5815/ijisa.2013.10.10 fatcat:u37zcza5knh2zgxs6643lzpnh4

Article 13 Entry and Clearance Regulations [chapter]

Ruwantissa Abeyratne
2013 Convention on International Civil Aviation  
Entry and Clearance Regulations Legal Issues The basic legal issues encompassing the issuance of ePassports are privacy of the individual 12 ; and the internal security of a State.  ...  can obfuscate the issue and preclude one from conducting a meaningful legal study of the State's conduct. 42 Security It is incontrovertible that in issuing an ePassport, the State concerned ensures  ... 
doi:10.1007/978-3-319-00068-8_14 fatcat:nnmsax4kjngohpubrtvn3gxofu

Biometric Passport Validation Scheme using Radio Frequency Identification

V.K. Narendira Kumar, B. Srinivasan
2013 International Journal of Computer Network and Information Security  
The electronic passport is the privacy and security risks that arise by embedding RFID technology.  ...  Electronic passports as it is sometimes called, represents a bold initiative in the deployment of two new technologies: RIFD and biometrics such as face, fingerprints, palm prints and iris.  ...  On-line Secure E-Passport Protocol To resolve the security issues identified in both the first-and second-generation of e-Passports, in this section, we present an on-line secure e-Passport protocol (OSEP  ... 
doi:10.5815/ijcnis.2013.05.04 fatcat:tf5vgdjiuvdknfhvmcrc2ts3la

Design and Development of Biometrics Secure Person Detection System for E-Passport using Cryptographic Security Protocols

V.K. Narendira Kumar, B. Srinivasan
2013 International Journal of Computer Network and Information Security  
The electronic passport is the privacy and security risks that arise by embedding with biometric technology.  ...  Biometric Passports have been introduced in many countries to improve the security in Inspection Systems and enhance procedures and systems that prevent identity and passport fraud.  ...  LITERATURE SURVEY Juels et al (2005) discussed security and privacy issues that apply to e-passports.  ... 
doi:10.5815/ijcnis.2013.12.10 fatcat:k3njk7e5c5bnnopbu22iacuzji

Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies [article]

David Cerezo Sánchez
2020 arXiv   pre-print
Solving one of the most pressing problems in blockchains, a zk-PoI cryptocurrency is proved to have the following advantageous properties: - an incentive-compatible protocol for the issuing of cryptocurrency  ...  and the blockchain scalability trilemma when instantiated on a blockchain with a consensus protocol based on the cryptographic random selection of nodes.  ...  For a recent survey of these topics, see [AH19] .  ... 
arXiv:1905.09093v2 fatcat:djetqb5mcvh3vo4hdsenyobiuu

User-aided reader revocation in PKI-based RFID systems*

Rishab Nithyanand, Gene Tsudik, Ersin Uzun, Dimitris Gritzalis
2011 Journal of Computer Security  
We take advantage of the user's awareness and presence to construct a simple, efficient, secure and (most importantly) feasible solution.  ...  In this context, public key certificates form the cornerstone of the overall system security.  ...  Acknowledgments: The authors are grateful to Bruno Crispo, Markus Ullman and the anonymous reviewers of ESORICS 2010 for their valuable comments on the preliminary version of this paper.  ... 
doi:10.3233/jcs-2011-0435 fatcat:h5phzfubzba6deodtozr3nugby

An investigative analysis of the security weaknesses in the evolution of RFID enabled passport

Eyad Abdullah Bogari, Pavol Zavarsky, Dale Lindskog, Ron Ruhl
2012 International Journal of Internet Technology and Secured Transactions  
This paper presents the evolution of these passports over the years to develop taxonomy of the weaknesses and to serve as a reference point detailing security vulnerabilities linked to the RFID Epassport  ...  The first two generations of E-passports are being issued worldwide.  ...  SURVEY OF E-PASSAPORT VULNERABILITIES Governments around the globe are issuing the RFID Epassports to their citizens.  ... 
doi:10.1504/ijitst.2012.054060 fatcat:77rl2omgn5fkjaubgm4xi6yaj4

Next Generation Electronic Passport Scheme using Cryptographic Authentication Protocols and Multiple Biometrics Technology

V.K. Narendira Kumar, B. Srinivasan
2013 International Journal of Information Engineering and Electronic Business  
The epassport, as it is somet imes called, represents a bold initiat ive in the deployment of two new technologies: cryptography security and biometrics (face, fingerprints, palm prints and iris).  ...  A passport contains the important personal informat ion of holder such as photo, name, date of birth and place, nationality, date of issue, date of expiry, authority and so on.  ...  Experimental results are given in Sect ion 6 (2005) d iscussed security and privacy issues that apply to e-passports.  ... 
doi:10.5815/ijieeb.2013.02.06 fatcat:wtvyi2fcuvbw5m2hglmzwlg4nu

Readers Behaving Badly [chapter]

Rishab Nithyanand, Gene Tsudik, Ersin Uzun
2010 Lecture Notes in Computer Science  
We take advantage of the user's awareness and presence to construct a simple, efficient, secure and (most importantly) feasible solution.  ...  In this context, public key certificates form the cornerstone of the overall system security.  ...  The authors are grateful to Bruno Crispo and Markus Ullman for their valuable comments on the previous version of this paper. This work is supported in part by NSF Cybertrust grant #0831526.  ... 
doi:10.1007/978-3-642-15497-3_2 fatcat:g3xx356dknh7nmiajmbyivtsti

Analyses of Security, Privacy Issues and Challenges for RFID System

Jung-Tae Kim
2011 Journal of information and communication convergence engineering  
Considering this RFID security issues, we survey the security threats and open problems related to issues by means of information security and privacy.  ...  Existing RFID protocols are able to resolve a number of security and privacy issues, but still unable to overcome other security & privacy related issues.  ... 
doi:10.6109/ijice.2011.9.6.701 fatcat:oe3o4geztzdyjkoq6kyvwqxs3m

Digital and mobile identities

Holger Funke
2020 Open Identity Summit  
This paper lists a selection of outstanding projects using mobile and digital identities in the field of mobile ID.  ...  A scalable architecture, standard future-proven technologies such as ISO/IEC 23220 and a Cryptographic Service Provider build the framework for secure, failsafe and large deployments.  ...  This solution allows a flexible process to support travellers who lost their ePassport and who are now in need of urgent travel documents yet in a location where delivery of a standard ePassport is either  ... 
doi:10.18420/ois2020_02 dblp:conf/openidentity/Funke20 fatcat:bk2ev24ihbg2dm4es3oqrx6kie

Evolution of Electronic Passport Scheme using Cryptographic Protocol along with Biometrics Authentication System

V.K. Narendira Kumar, B. Srinivasan
2012 International Journal of Computer Network and Information Security  
The paper explores the privacy and security implications of this impending worldwide experiment in biometrics authentication technology.  ...  The epassport is equipped with contactless chip which stores personal data of the passport holder, information about the passport and the issuing institution, as well as with a multiple biometrics enabling  ...  In 2005, Juels, Molnar and Wagner presented a survey on MRTD and RFID. Among other issues, they discussed about the "biometric threat" and shortcomings in the Basic Access Control(BAC) protocol.  ... 
doi:10.5815/ijcnis.2012.02.08 fatcat:euefse4ckzdnhg4c3ddiu3xnwu

Efficient Implementation of Electronic Passport Scheme Using Cryptographic Security Along With Multiple Biometrics

V.K. NARENDIRA KUMAR, B. SRINIVASAN, P. NARENDRAN
2012 International Journal of Information Engineering and Electronic Business  
The paper also provides a cryptographic security analysis of the e-passport using face fingerprint, palm print and iris biometric that are intended to provide improved security in protecting biometric  ...  The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place.  ...  Literature Survey Juels et al (2005) discussed security and privacy issues that apply to e-passports.  ... 
doi:10.5815/ijieeb.2012.01.03 fatcat:ldjnw53dinay5br5srp7zhnnwm

Usability of Display-Equipped RFID Tags for Security Purposes [chapter]

Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, Ersin Uzun
2011 Lecture Notes in Computer Science  
The recent emergence of RFID tags capable of performing public key operations has enabled a number of new applications in commerce (e.g., RFIDenabled credit cards) and security (e.g., ePassports and access-control  ...  Even though they are powerful enough to perform sophisticated public key cryptographic operations, security and privacy issues remain when these tags are used as a means of payment or for owner/bearer  ...  Acknowledgements The authors are grateful to NXP Semiconductors, especially to Thomas Suwald and Arne Reuter, for providing us with the display-equipped tags used in our studies.  ... 
doi:10.1007/978-3-642-23822-2_24 fatcat:abmyzefdenhifj2fqqr6hbwuzq
« Previous Showing results 1 — 15 out of 67 results