Filters








1,981 Hits in 10.7 sec

On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards [chapter]

Marian Harbach, Sascha Fahl, Matthias Rieger, Matthew Smith
2013 Lecture Notes in Computer Science  
We investigate the adoption of the new German national identity card, as it is the first eID-enabled card with dedicated features to enable privacy-preserving online authentication.  ...  We present results of three focus groups as well as interviews with service providers, showing that preserving privacy is just one of several factors relevant to the acceptance of novel authentication  ...  Influence of the Official Nature of the Identity Card Participants found that a national ID card is one of the most important documents one has and it is perceived to be "a very personal document" that  ... 
doi:10.1007/978-3-642-39077-7_13 fatcat:inqge3zhmze27pxldq5t6cimw4

Exploiting TLS Client Authentication for Widespread User Tracking

Lucas Foppe, Jeremy Martin, Travis Mayberry, Erik C. Rye, Lamont Brown
2018 Proceedings on Privacy Enhancing Technologies  
However, with the development of its Push Notification Service, Apple has deployed this technology on millions of devices for the first time.  ...  Additionally, we show these attacks work against all known instances of TLS Client Certificate Authentication, including smart cards like those widely deployed by the Estonian government as part of their  ...  Views and conclusions are those of the authors and should not be interpreted as representing the official policies or position of the U.S. Government.  ... 
doi:10.1515/popets-2018-0031 dblp:journals/popets/FoppeMMRB18 fatcat:x4nhqqlju5gmfdmqh62dnskrsa

Toward Mending Two Nation-Scale Brokered Identification Systems

Luís T. A. N. Brandão, Nicolas Christin, George Danezis
2015 Proceedings on Privacy Enhancing Technologies  
Within the structural design constraints placed on these nation-scale brokered identification systems, we propose feasible technical solutions to the privacy and security issues we identified.  ...  To address the problem, some countries have proposed nation-scale identification/authentication systems that intend to greatly reduce the burden of credential management, while seemingly offering desirable  ...  The authors thank Rene Peralta for significant contributions to this work, Erman Ayday for shepherding the final revision of this paper, and the anonymous reviewers for valuable feedback that contributed  ... 
doi:10.1515/popets-2015-0022 dblp:journals/popets/BrandaoCDa15 fatcat:33fwhngovfgodlpjnuxfvppmmm

Personal Information Self-Management: A Survey of Technologies Supporting Administrative Services

Paul Marillonnet, Maryline Laurent, Mikaël Ates
2021 Journal of Computer Science and Technology  
It classifies a selection of scientific technologies into four categories of solutions: Personal Data Store (PDS), Identity Manager (IdM), Anonymous Certificate System and Access Control Delegation Architecture  ...  Third, this paper achieves a functional comparison of solutions of very different technical natures. The outcome of this paper is the clear identification of functional gaps of each solution.  ...  The support of remote sources is considered critical as it is at the core of the use case relying on several sources maintained by official authorities at national and European levels.  ... 
doi:10.1007/s11390-021-9673-z fatcat:xhsehergrvaalkmmkfx25tv2fu

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

Ding Wang, Ping Wang
2014 Computer Networks  
Anonymity is among the important properties of two-factor authentication schemes for wireless sensor networks (WSNs) to preserve user privacy.  ...  Secondly, using these two foremost schemes as case studies and on the basis of the work of Halevi-Krawczyk (1999) [44] and Impagliazzo-Rudich (1989) [43], we put forward a general principle: Public-key  ...  This research was partially supported by the National Natural Science Foundation of China (NSFC) under Grants Nos. 61170263 and 61170282.  ... 
doi:10.1016/j.comnet.2014.07.010 fatcat:bnjs3othbvc2rgaqwmeo3nwfka

Surveillance privacy and technology: contemporary Irish perspectives [chapter]

Kenny Doyle
2013 Internet research, theory, and practice: perspectives from Ireland  
The interviews covered the participants knowledge of surveillance, privacy and technology in the three social roles of worker, citizen and consumer.  ...  Thus the three main themes of the interviews centred around work, security and consumption, with each theme opening up a series of discussions on normative expectations regarding surveillance and privacy  ...  In the case of the Superquinn Rewards card, the Tesco Clubcard and the Dunnes Valueclub card, each euro spent earns the bearer one point which is ultimately redeemable as one cent.  ... 
doi:10.14705/rpnet.2013.000091 fatcat:3iv3nxvcqjaotemeq6mtwjuwsa

Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields

Rene Von Schomberg
2011 Social Science Research Network  
Acknowledgements The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007(FP7/ -2013  ...  Both cases assume normative baselines for acceptable risks or acceptable infringements of privacy rights.  ...  He draws on the TECHNOLIFE project which addresses among other the case of biometric technology.  ... 
doi:10.2139/ssrn.2436399 fatcat:6gveo3yisndd5evuqjgmmn7v7q

Rethinking Authentication on Smart Mobile Devices

Ding Wang, Jian Shen, Joseph K. Liu, Kim-Kwang Raymond Choo
2018 Wireless Communications and Mobile Computing  
It is our hope that this special issue will advance the understanding and research of User Authentication on Smart Mobile Devices. We hope you enjoy the papers. Ding Wang Jian Shen Joseph K.  ...  The launch of this special issue was in 4 Wireless Communications and Mobile Computing part supported by the National Key Research and Development Plan under Grants Nos. 2016YFB0800600, and by the National  ...  The topics covered in the accepted papers range from attacks against fingerprint sensor hardware, biometric template protection, privacy-preserving message authentication, new lightweight cryptographic  ... 
doi:10.1155/2018/7079037 fatcat:v52bgxp5enbqddcqy557hilstm

An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects [chapter]

Martina de Gramatica, Fabio Massacci, Olga Gadyatskaya
2014 Communications in Computer and Information Science  
This paper presents only the authors' point of view, and does not reflect the opinion of the EC.  ...  The work leading to this report was supported by the EU under the FP7 ICT EFFECTS+ and SECCORD projects.  ...  The technology acceptance among the students was good. According to the results of an anonymous questionnaire, they trusted the system and were convinced that their privacy was preserved.  ... 
doi:10.1007/978-3-319-12574-9_14 fatcat:wbh33s23cna7rnozpcqsbgp5ym

The digital person: technology and privacy in the information age

2005 ChoiceReviews  
Library of Congress Cataloging-in-Publication Data Solove, Daniel J., -The digital person : technology and privacy in the information age / Daniel J. Solove. p. cm.  ...  Digital technology enables the preservation of the minutia of our everyday comings and goings, of our likes and dislikes, of who we are and what we own.  ...  This is another way in which identity theft differs from credit card fraud or the theft of an ATM card or access card. Once the card is cancelled, the crime ends.  ... 
doi:10.5860/choice.42-5512 fatcat:ykjb5bktfreqriocajinc45t6e

Estonian Internet Voting with Anonymous Credentials

2021 Turkish Journal of Electrical Engineering and Computer Sciences  
This necessarily requires careful authentication of the eligible voters and makes the Estonian identity card solution a crucial part of the scheme, however, note that Parsovs has recently drawn attention  ...  In this study, we propose an e-voting scheme EIV-AC that integrates the EIV scheme with anonymous credentials based on self sovereign identity.  ...  For instance, an ID-card can serve as a credential to authenticate one self.  ... 
doi:10.3906/elk-2105-197 fatcat:paqvrx4655fqhgezodarrk7rsm

Privacy-Friendly Checking of Remote Token Blacklists [chapter]

Roel Peeters, Andreas Pashalidis
2013 IFIP Advances in Information and Communication Technology  
This paper defines a range of desirable properties for privacy preserving blacklist checking protocols, and surveys existing technical solutions to this problem.  ...  Consulting a remote blacklist as part of verifying a token should not come at the cost of privacy. In particular, the blacklist provider should be unable to identify which tokens are being verified.  ...  Acknowledgements We would like to thank Julien Bringer for his insightful comments on an earlier version of this paper.  ... 
doi:10.1007/978-3-642-37282-7_3 fatcat:twnoybca2ncazk7dyourjoscty

Evil Offspring - Ransomware and Crypto Technology

Hilarie Orman
2016 IEEE Internet Computing  
Compromising Security and Identity Many authentication protocols rely upon bringing out shared secrets.  ...  Black is a computer scientist at the US National Institute of Standards and Technology.  ...  UAH is located in an expanding, high technology area, next door to one of the largest research parks in the nation.  ... 
doi:10.1109/mic.2016.90 fatcat:v5zmzx7qrba5dkqxweoo3ifvry

I Can't Be Myself

Rawan Alharbi, Tammy Stump, Nilofar Vafaie, Angela Pfammatter, Bonnie Spring, Nabil Alshurafa
2018 Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies  
Wearers' attempts to reduce this discomfort by modifying their behavior or abandoning the device threatens the validity of observations of authentic behaviors.  ...  We argue that mounting the camera on different body locations with a different lens orientation, gives a device recording affordance that has the effect of reducing surveillance and social discomfort compared  ...  The authors acknowledge support by the National Institutes of Health under award number UL1TR001422, and by the Institute of Public Health and Medicine at Northwestern University.  ... 
doi:10.1145/3264900 pmid:32318649 pmcid:PMC7173726 fatcat:fdgpfzcji5enxbzp5g42f2owpe

Privacy and security threat analysis of the federal employee personal identity verification (PIV) program

Paul A. Karger
2006 Proceedings of the second symposium on Usable privacy and security - SOUPS '06  
This paper is a security and privacy threat analysis of new Federal Information Processing Standard for Personal Identity Verification (FIPS PUB 201).  ...  However, when you examine the standard in the context of potential user scenarios regarding its use; security, privacy, and usability problems can be identified.  ...  In response to this HSPD, the National Institute of Standards and Technology (NIST) developed Federal Information Processing Standard Publication (FIPS PUB) 201 [33] on Personal Identity Verification  ... 
doi:10.1145/1143120.1143135 dblp:conf/soups/Karger06 fatcat:xtp3pf6hpbehzmgrruspyi5kgq
« Previous Showing results 1 — 15 out of 1,981 results