A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Post-Quantum Fuzzy Commitment Scheme for Biometric Template Protection: An Experimental Study
2021
IEEE Access
CONCLUSIONS In this paper, the author proposed a new post-quantum fuzzy commitment scheme (PQFC) for biometric template protection. ...
SECURITY PROPERTIES This section investigates the security properties of the ISO/IEC 24745 standard for biometric template protection. ...
doi:10.1109/access.2021.3100981
fatcat:vpc34nzaefcmbi5kectkdbmozm
Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption
[chapter]
2016
Lecture Notes in Computer Science
In this work we propose a very efficient protocol for privacy-preserving biometric authentication using lattice-based encryption. ...
While the use of biometric data enables many useful applications, these data are very sensitive. For this reason, it is essential to handle them with the least user exposure. ...
a good candidate for the post-quantum era of cryptography [6] . ...
doi:10.1007/978-3-319-29883-2_11
fatcat:sv7qnwu56zgq5mzhtj4oldmjbi
Preserving Privacy in Speaker and Speech Characterisation
2019
Computer Speech and Language
Whereas many privacy-preserving technologies have been developed for other biometric characteristics, very few solutions have been proposed to protect privacy in the case of speech signals. ...
Such protection, in the form of privacy-preserving technologies, is required to ensure that: (i) the biometric profiles of a given individual (e.g., across different biometric service operators) are unlinkable ...
reference UID/CEC/50021/2013; the SpeechXRays project that has received funding from the European Union's Horizon 2020 research and innovation program under grant agreement no 653586; the Privacy Preserving Secure ...
doi:10.1016/j.csl.2019.06.001
fatcat:lgq6bz2y5zepvfbrfznhboplha
Biometric template security
2009
SPIE Newsroom
Biometric Template Security By Abhishek Nagar With the proliferation of biometric recognition systems, an attacker's benefit in staging a system compromise is also increasing and thus is the need to ensure ...
system security and integrity. ...
[142] proposed two template transformation schemes for iris images. ...
doi:10.1117/2.1200911.001590
fatcat:3uykbccxwnfcpcodymfook557y
Biometric Template Security
2008
EURASIP Journal on Advances in Signal Processing
Biometric Template Security By Abhishek Nagar With the proliferation of biometric recognition systems, an attacker's benefit in staging a system compromise is also increasing and thus is the need to ensure ...
system security and integrity. ...
[142] proposed two template transformation schemes for iris images. ...
doi:10.1155/2008/579416
fatcat:rrogtu2eh5d3dpyftnwm5dd2m4
Biometric Cryptosystem to Secure Smart Object Communications in the Internet of Things
2021
Maǧallaẗ Al-Kuwayt li-l-ʿulūm
As a result, in this paper, we proposed a secure IoT framework based on cloud computing. ...
In this study, we focused on the security aspect of connecting people to their objects using biometric cryptosystems. ...
Digital image security: Fusion of encryption, steganography and watermarking, In: International Journal of Advanced Computer Science and Applications (IJACSA), vol. 8, no. 5. ...
doi:10.48129/kjs.11169
fatcat:p36kh6bbtba2paux4sphhkhp3u
Humanode Whitepaper: You are [not] a bot
[article]
2021
arXiv
pre-print
cryptographically secure neural networks for the private classification of 3D templates of users' faces 2) a private Liveness detection mechanism for identification of real human beings 3) a Substrate ...
Humanode is a network safeguarded by cryptographically secure bio-authorized nodes. Users will be able to deploy nodes by staking their encrypted biometric data. ...
If an efficient quantum computer is ever built, a post-quantum encryption scheme can resist attacks. ...
arXiv:2111.13189v1
fatcat:6pc4nj46sjdkvketwydvwh2ulu
Article 13 Entry and Clearance Regulations
[chapter]
2013
Convention on International Civil Aviation
Fingerprint image(s) and/or iris image(s) are optional biometrics for member States wishing to supplement the facial image with another biometric in the passport. ...
The provision also calls for States Parties to ensure the integrity and security of travel or identity documents issued by or on behalf of the States Parties and to prevent their unlawful creation, issuance ...
doi:10.1007/978-3-319-00068-8_14
fatcat:nnmsax4kjngohpubrtvn3gxofu
Cyber terrorism and aviation—national and international responses
2011
Journal of Transportation Security
At the 21st Aviation Security Panel Meeting of ICAO (AVSECP/21, 22 to 26 March 2010) ...
For an informative discussion on Cyber terrorism post 9/11 see Wanda I. ...
The use of biometric information for the identification of persons is another method that counters cyber terrorism and interference of computer imagery. ...
doi:10.1007/s12198-011-0074-3
fatcat:kwbrkaig7bep3enn7wqrn5slge
Security and privacy for 6G: A survey on prospective technologies and challenges
[article]
2021
arXiv
pre-print
Second, physical layer protection, deep network slicing, quantum-safe communications, artificial intelligence (AI) security, platform-agnostic security, real-time adaptive security, and novel data protection ...
However, for now, security and privacy issues for 6G remain largely in concept. ...
using post-quantum algorithms. ...
arXiv:2108.11861v1
fatcat:o7fgtm4tobfk5knltojut6xpyi
Hands-Free Authentication for Virtual Assistants with Trusted IoT Device and Machine Learning
2022
Sensors
The protocol was validated with automatic formal security analysis. ...
smart home behavior for continuous authentication. ...
Acknowledgments: The authors thank the support provided by the Laboratory of Computer Architecture and Networks (LARC) at the Computing and Digital Systems Engineering Department (PCS), Polytechnic School ...
doi:10.3390/s22041325
pmid:35214227
pmcid:PMC8874467
fatcat:6xzkeybjmfat3lcdednt3lkj3q
Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities
2020
Proceedings of the IEEE
Approximate Computing for Cryptography 1) Post Quantum Cryptography (PQC): Discrete Gaussian sampling is a critical constituent of many LBC based schemes [70] . ...
Cryptography
1) Post-Quantum Cryptography (PQC): In the near future, quantum computers will break today's most popular public-key cryptographic systems, including RSA, elliptic-curve cryptography, DSA ...
doi:10.1109/jproc.2020.3030121
fatcat:vgxrxqkoibhgflrwq6rrfz7ofm
Aerodrome Security
[chapter]
2014
Law and Regulation of Aerodromes
Therefore, security at the airport carries multiple dimensions, from border control to body scanning; from cargo security to security of the aircraft and its passengers. ...
online check-in where airlines can check in passengers through their mobile services, ease congestion at the terminal check in counters; mobile devices and hand held terminals with Wi-Fi connections; biometric ...
Data protection legislation, including data privacy laws have been enacted by many countries throughout the world for two main reasons: protection of privacy; and ensuring of access by the owner to his ...
doi:10.1007/978-3-319-04780-5_6
fatcat:jnnw7qiz3fclxegzhvucbgpskq
Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges
[article]
2022
arXiv
pre-print
Best practices on developing Protection Profiles, recommendations, and future directions for trusted cybersecurity advancement are presented. ...
Common Criteria for Information Technology Security Evaluation (often referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for cyber security certification. ...
ACKNOWLEDGMENT We acknowledge Mr Bosheng Yan's contribution to data collection in relation to Protection Profile development through his internship associated with the Development of Australian Cyber Criteria ...
arXiv:2201.07417v4
fatcat:2isn6dnvavcxxe4epaodhrqzsa
Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges
2022
IEEE Access
INDEX TERMS Common criteria, cyber security, protection profile, security standard and certification, trusted system. ...
The Common Criteria for Information Technology Security Evaluation (often referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for cyber security. ...
ACKNOWLEDGMENT The authors would like to acknowledge Bosheng Yan's contribution to data collection in relation to Protection Profile development through his internship associated with the Development of ...
doi:10.1109/access.2022.3168716
fatcat:jqzrlkphkzh7zizdy247kbiv34
« Previous
Showing results 1 — 15 out of 44 results