Filters








207 Hits in 7.5 sec

The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security [chapter]

Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
2012 Lecture Notes in Computer Science  
We discuss an efficient combination of the cryptographic protocols adopted by the International Civil Aviation Organization (ICAO) for securing the communication of machine readable travel documents and  ...  Here we show that by carefully re-using some of the secret data of the PACE protocol for the AA protocol one can save one exponentiation on the passports's side. We call this the PACE|AA protocol.  ...  Acknowledgments We thank the anonymous reviewers of FC'12 for helpful comments. This work was supported by CASED (http://www.cased.de).  ... 
doi:10.1007/978-3-642-32946-3_25 fatcat:mvd65ghhfvfctnvuxocstrez2i

ePassport Protocol on the Spi Calculus

Safa Saoudi, Souheib Yousfi, Riadh Robbana
2016 International Workshop on Verification and Evaluation of Computer and Communication Systems  
This is a proof of the importance of ePassport protocols which aim to improve the document security and the traveller authentication.  ...  Electronic passport promises the possibility of a secure, simple and quick travel formalities. Many countries have started delivering electronic documents to their citizens.  ...  Introduction Developing technologies and security standards has encourage governments to pursue the issuance of more sophisticated Machine Readable Travel Documents (MRTDs) to their citizens.  ... 
dblp:conf/vecos/SaoudiYR16 fatcat:3bk5atjgpbbjbfdmcxpxzhf4ge

Security considerations on extending PACE to a biometric-based connection establishment

Nicolas Buchmann, Roel Peeters, Harald Baier, Andreas Pashalidis
2013 Biometrics and Electronic Signatures  
Since then EU member states adopt the format and the access protocols to further electronic machine readable travel documents (eMRTD) liken ational electronic ID cards and electronic residence permits,  ...  respectively.T he security protocols to communicate with an eMRTD are based on the paradigm of strong cohesion and loose coupling, i.e., each step is designed to ensure only ap articular security goal  ...  Acknowledgement This work wass upported by the European Commission through the FIDELITY EU-FP7 project (Grant No. SEC-2011-284862), CASED and the Research Council KU Leuven: GOATENSE (GOA/11/007).  ... 
dblp:conf/biosig/BuchmannPBP13 fatcat:jlcc5oteufgwfogswpnwhdcldu

ePassport and eID Technologies [chapter]

Lucjan Hanzlik, Mirosław Kutyłowski
2021 Security of Ubiquitous Computing Systems  
AbstractThis chapter is devoted to the design and implementation of electronic ID (eID) such as ePassports and electronic personal identity documents.  ...  Thereby we aim to shed light on the development of ubiquitous systems, where many artifacts will require strong electronic identification with similar properties to those in the case of eIDs issued for  ...  The ICAO standard for Machine Readable Travel Documents specifies two cryptographic protocols that can be used to authenticate a chip.  ... 
doi:10.1007/978-3-030-10591-4_5 fatcat:v3miqnqj4vhsneltru32b4wkte

An investigative analysis of the security weaknesses in the evolution of RFID enabled passport

Eyad Abdullah Bogari, Pavol Zavarsky, Dale Lindskog, Ron Ruhl
2012 International Journal of Internet Technology and Secured Transactions  
This paper presents the evolution of these passports over the years to develop taxonomy of the weaknesses and to serve as a reference point detailing security vulnerabilities linked to the RFID Epassport  ...  features in the first and second E-passport generations.  ...  The BSI explains the CA v1 mechanism as an ephemeral-static DH key agreement protocol that provides secure communication and independent authentication of the Machine Readable Travel Document (MRTD) chip  ... 
doi:10.1504/ijitst.2012.054060 fatcat:77rl2omgn5fkjaubgm4xi6yaj4

Remote Document Encryption - encrypting data for e-passport holders [article]

Eric R. Verheul
2017 arXiv   pre-print
The same is possible for electronic identity cards and driver licenses. We also indicate possible applications.  ...  Dutch passports allow for 160 bit security, theoretically giving sufficient security beyond the year 2079, exceeding current good practice of 128 bit security.  ...  As as indicated in Figure 2 , CA and its secure messaging can only be established after a successful execution of either the BAC or PACE protocol.  ... 
arXiv:1704.05647v3 fatcat:5nhpv7eqorg3bghdubc5xqi3vy

Towards a more secure and scalable verifying PKI of eMRTD

Nicolas Buchmann, Harald Baier
2014 Journal of Computer Security  
The new electronic passport stores biometric data on a contactless readable chip to uniquely link the travel document to its holder.  ...  In addition to these Internet protocols we evaluate state-of-the-art security protocols proposed by the scientific community, e.g., the Hoepman protocol, the BioPACE V2 protocol and the On-line Secure  ...  Acknowledgments This work was supported by the European Commission through the FIDELITY EU-FP7 project (Grant No. SEC-2011-284862) and CASED.  ... 
doi:10.3233/jcs-140522 fatcat:xquxc2tsxzhrdkvcidu2z2fmcm

Towards a More Secure and Scalable Verifying PKI of eMRTD [chapter]

Nicolas Buchmann, Harald Baier
2014 Lecture Notes in Computer Science  
The new electronic passport stores biometric data on a contactless readable chip to uniquely link the travel document to its holder.  ...  In addition to these Internet protocols we evaluate state-of-the-art security protocols proposed by the scientific community, e.g., the Hoepman protocol, the BioPACE V2 protocol and the On-line Secure  ...  Acknowledgments This work was supported by the European Commission through the FIDELITY EU-FP7 project (Grant No. SEC-2011-284862) and CASED.  ... 
doi:10.1007/978-3-642-53997-8_7 fatcat:vl4z6dtjb5gmrkk4rw6tvdkptm

THE RADAR ARCHITECTURE FOR PERSONAL COGNITIVE ASSISTANCE

DAVID GARLAN, BRADLEY SCHMERL
2007 International journal of software engineering and knowledge engineering  
In this paper we describe the architecture and its implementation for a personal cognitive assistant called RADAR.  ...  Current desktop environments provide weak support for carrying out complex user-oriented tasks.  ...  Acknowledgements Many people at CMU have participated in building RADAR and running the tests, and we would like to acknowledge them for their hard work.  ... 
doi:10.1142/s0218194007003033 fatcat:6445o2jf7reqfja6yhzdwhafl4

The Social Responsibility of Software Development

Diomidis Spinellis
2017 IEEE Software  
itself and for the documentation that accompanies it.  ...  Notebooks have become popular because they make it possible to combine the computational protocol used in a study with a scientific narrative into a single document.  ...  And it could be costly to defend yourself. IEEE understands your profession like no other!  ... 
doi:10.1109/ms.2017.48 fatcat:rxhnc3vjkjaddewb4jg6zl6sca

Ambysemy and eurisemy as phenomena in term semantic structure (Based on English IT-terminology)
Проявление амбисемии и эврисемии в семантической структуре термина (на материале английской IT-терминологии)

Lyudmila S. Yefremova, Saratov State University
2021 Izvestiya of Saratov University New Series Series Philology Journalism  
The article investigates such semantic phenomena as ambisemy and eurisemy, and how they are implemented in definitions of English IT-terms and lexical meanings of those determinologised lexical units.  ...  The research data is based on both English professional dictionaries and general English online dictionaries.  ...  A printed copy of machine output in a visually readable form; for example, printed reports, listings, documents, and summaries. hardening n.  ... 
doi:10.18500/1817-7115-2021-21-2-155-160 fatcat:idlxm4kawbbvrdu6hj4mrggv3u

Strengthening trust in the identity life cycle [article]

Nicolas Buchmann, Universitätsbibliothek Der FU Berlin, Universitätsbibliothek Der FU Berlin
2019
Travel documents have become an integral part of travelling into foreign countries and play a major role for border control.  ...  Today's electronic travel documents rely on electronic security protocols and infrastructure, which exhibit multiple shortcomings.  ...  It was demonstrated that multiple enhancements for electronic machine readable travel documents are achievable due to advances in security protocols and infrastructure to strengthen the overall trust in  ... 
doi:10.17169/refubium-1829 fatcat:23mb2ng5j5hddgpbmldt5xylfm

Security Analysis of CPace [article]

Michel Abdalla, Björn Haase, Julia Hesse
2021 IACR Cryptology ePrint Archive  
By allowing for the modular replacement of assumptions used in the proof, this new approach avoids a repeated analysis of unchanged protocol parts and lets us efficiently analyze the security guarantees  ...  Our analysis is realistic in the sense that it captures adaptive corruptions and refrains from modeling CPace's Map2Pt function that maps field elements to curve points as an idealized function.  ...  [11] conducted a game-based security analysis of the explicitly authenticated PACE protocol variants used in travel documents.  ... 
dblp:journals/iacr/AbdallaHH21 fatcat:khbvfuet6jcytdoy4yekzfm2py

News From the Field

American Library Association
1976 College & research libraries news  
Pace Library to support the de velopment of its comprehensive collection of rare books, manuscripts, and documentary sources relating to West Florida and the Gulf Region.  ...  to through cathode ray terminals, (2) to utilize the 35 or more other bibliographic computer-readable data bases available through national computer networks, (3) to improve and extend document delivery  ... 
doi:10.5860/crln.37.11.306 fatcat:dpm22iwxhzbatgipqsya6mzy6y

Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases [chapter]

Rajesh Singh, Anita Gehlot, Dharam Buddhi
2022 Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases  
Chronic Diseases are the most dangerous diseases for humans and have significant effects on human life. Chronic Diseases like heart disease & Diabetes are the main causes of death.  ...  A comparative study of different machine learning classifiers for chronic disease prediction viz Heart Disease & Diabetes Disease is done in this paper.  ...  However, still further research is needed to overcome the challenges and making the Stirling engine commercially viable and cost effective. for multiple applications.  ... 
doi:10.13052/rp-9788770227667 fatcat:da47mjbbyzfwnbpde7rgbrlppe
« Previous Showing results 1 — 15 out of 207 results