63 Hits in 3.9 sec

Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability [chapter]

Martin Schaffer, Peter Schartner
2006 Lecture Notes in Computer Science  
In this paper we propose three smartcard-based variants of anonymous authentication using unique one-time pseudonyms. The first variant can be used to authenticate a user.  ...  Some selected applications for the proposed protocols include physical access control, secure auctions, eCoins and online gambling.  ...  Acknowledgements The authors would like to thank Dieter Sommer for his useful comments.  ... 
doi:10.1007/11733447_15 fatcat:gm47oeqfanbjjol6vc7ppw6xsi

Controlled Physical Random Functions [chapter]

Blaise Gassend, Marten van Dijk, Dwaine Clarke, Srinivas Devadas
2007 Security with Noisy Data  
CPUFs can be used to establish a shared secret between a physical device and a remote user.  ...  Once established, the shared secret can be used to enable a wide range of applications.  ...  The proposed infrastructure is flexible enough to allow multiple mutually mistrusting parties to securely use the same device.  ... 
doi:10.1007/978-1-84628-984-2_14 fatcat:xjfyhbm66bg73i5hcxopowqgvu

Securing the communication of medical information using local biometric authentication and commercial wireless links

Vladimir I. Ivanov, Paul L. Yu, John S. Baras
2010 Health Informatics Journal  
We consider a portable, wireless device transferring medical information to a remote server.  ...  Thus we push the limits of the network security to the edge by authenticating the user using their biometric information; authenticating the device to the network at the physical layer; and strengthening  ...  The US Government is authorized to reproduce and distribute reprints for Government purposes, notwithstanding any copyright notation thereon.  ... 
doi:10.1177/1460458210377482 pmid:20889851 fatcat:s6vmkuxwovdefmg4uggx6szr3y

IoT in Safety and Security of Automobiles

Shamik Palit, Chandrima Sinha Roy
For an automobile for safety and security, I am making progress in making an IoT comparative analysis. A new web wave that is expected to rework our lives could be the Things Web (IoT).  ...  IoT could be an era of RIOTous, with the remarkable ability to control the world and the method we tend to live. It uses gadgets and sensors relating to the net, which produce new characteristics.  ...  The main objective or scope is to make use of,, reliable authentication technique. After that suggest a new security policy to the existing policy. III.  ... 
doi:10.35940/ijitee.b8222.1210220 fatcat:dnyo3qukknb35eizpvszpu36x4

From meiwaku to tokushita!

Scott Mainwaring, Wendy March, Bill Maurer
2008 Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems - CHI '08  
Based on ethnographically-inspired research in Japan, we report on people's experiences using digital money payment systems that use Sony's FeliCa near-field communication smartcard technology.  ...  Adoption is strongly tied to Japanese conceptions of the aesthetic and moral virtue of smooth flow and avoidance of commotion, as well as the excitement at winning something for nothing.  ...  Near-field communication (NFC) and security technologies enable incorporation of both kinds of cards into mobile devices, allowing one to pay with a wave or touch of ones' e-wallet.  ... 
doi:10.1145/1357054.1357058 dblp:conf/chi/MainwaringMM08 fatcat:dsyqqijiqjcmhodlp4lrbdie64

RFID security and privacy: a research survey

A. Juels
2006 IEEE Journal on Selected Areas in Communications  
RFID tags are small, wireless devices that help identify objects and people.  ...  Thanks to dropping cost, they are likely to proliferate into the billions in the next several years-and eventually into the trillions.  ...  ACKNOWLEDGMENT The author would like to thank F. Anjum, D. Bailey, D. Molnar, R. Poovendran, and S. Weis for their comments on and suggestions for this work.  ... 
doi:10.1109/jsac.2005.861395 fatcat:rv6e4c26lbhsjfs5kthw7tpvvy

Unique User-Generated Digital Pseudonyms [chapter]

Peter Schartner, Martin Schaffer
2005 Lecture Notes in Computer Science  
The identifier of the user and the identifier of the user's device will be used to generate unique pseudonyms, but to ensure pseudonymity, both components will be stored in the pseudonym in encrypted form  ...  More precisely, each user can now generate his pseudonym locally in his personal security environment, e.g. in his smart card or his personal digital assistant.  ...  Hence, there is no way (except breaking the encryption algorithm) to re-map a pseudonym to a user of the system. Online Gambling: Here, the player wants to stay anonymous during gambling.  ... 
doi:10.1007/11560326_15 fatcat:e2sqynsjijgppfhcbsjejziwvm

The Relationship Between Structural Game Characteristics and Gambling Behavior: A Population-Level Study

Tony Leino, Torbjørn Torsheim, Alex Blaszczynski, Mark Griffiths, Rune Mentzoni, Ståle Pallesen, Helge Molde
2014 Journal of Gambling Studies  
Two separate cross-classified multilevel random intercepts models were used to analyze the relationship between bets made, reward characteristics and bet characteristics, where the number of bets was nested  ...  The aim of this study was to examine the relationship between the structural characteristics and gambling behavior among video lottery terminal (VLT) gamblers.  ...  The results of these studies support the hypothesis that the structural characteristics of a gambling machine may influence gambling behavior.  ... 
doi:10.1007/s10899-014-9477-y pmid:24923625 pmcid:PMC4651975 fatcat:7xjnetwz2zeurd2hetnodzpmi4

Smart OpenID: A Smart Card Based OpenID Protocol [chapter]

Andreas Leicher, Andreas U. Schmidt, Yogendra Shah
2012 IFIP Advances in Information and Communication Technology  
In this paper, we present the concept of Smart OpenID, an enhancement to OpenID which moves part of the OpenID authentication server functionality to the smart card of the user's device.  ...  OpenID is a lightweight, easy to implement and deploy approach to Single Sign-On (SSO) and Identity Management (IdM), and has great potential for large scale user adoption especially for mobile applications  ...  We have shown that by introducing an additional entity, the local OP, to existing smart card security, we can create a more secure OpenID implementation without requiring changes to the protocol.  ... 
doi:10.1007/978-3-642-30436-1_7 fatcat:vmhepojsz5dsfbdtwjccqbbwry

Authentication, privacy, security can exploit brainwave by biomarker

Jeffrey Jenkins, Charles Sweet, James Sweet, Steven Noel, Harold Szu, Harold H. Szu, Liyi Dai
2014 Independent Component Analyses, Compressive Sampling, Wavelets, Neural Net, Biosystems, and Nanoengineering XII  
Among proven devices such as fingerprint readers and cameras that can sense the human eye's iris pattern, we introduced a number of users to a sequence of 'grandmother images', or emotionally evoked stimuliresponse  ...  There, we measure fluctuations in DTAB waves from a wireless, non-tethered, single node EEG device between the Personal Graphic Image Number (PGIN) stimulus image and the response time from an individual's  ...  ACKNOWLEDGEMENTS We would like to thank Dr. Binh Tran, Dr.  ... 
doi:10.1117/12.2051323 fatcat:7pv3mzkqerarthwpw72nuzs2uu

Systematic government access to private-sector data in Australia

D. J. B. Svantesson
2012 International Data Protecion Law  
or documents from operators of aircraft or vessels, 24 inspection of postal articles and delivery service articles, 25 the use of listening devices, 26 and the use of tracking devices. 27 Most importantly  ...  take, against loss, against unauthorized access, use, modification, or disclosure, and against other misuse; and (b) that if it is necessary for the record to be given to a person in connection with the  ...  Importantly, a record-keeper 'shall not use the information except for a purpose to which the information is relevant'. 63 Further, personal information obtained for a particular purpose may only be used  ... 
doi:10.1093/idpl/ips021 fatcat:wqinsglls5gv5jykabw7xchyba

ABC4Trust Workshop on Core Features of Privacy-ABCs, Practical Use, and Legal Issues [chapter]

Felix Bieker, Marit Hansen, Gert Læssøe Mikkelsen, Hannah Obersteller
2015 IFIP Advances in Information and Communication Technology  
As far as security tokens are concerned, the use of a storage device was suggested.  ...  In the workshop the participants assessed different options for tamper-proof devices (smartcards, mobile phones, USB sticks, etc.) which offer security and are ideal hardware tokens for storing the user's  ...  Although J managed not to gamble anymore for 4 weeks, his girlfriend left him for a professional poker player. J does not see any reason why he should not start gambling again.  ... 
doi:10.1007/978-3-319-18621-4_17 fatcat:qeskskwta5hplo3h2kxuvvrer4

Emerging Value Propositions For M-Commerce

Irvine Clarke III
1970 Journal of business strategies  
Mobile e-commerce,commonly referred to as m-commerce, is the ability to purchase goods anywherethrough a wireless Internet-enabled device.  ...  , and personalization.  ...  One example, is the SIM (Subscriber Identification Module 6 ) smartcards which serve as a mobile database allowing the user to run applications and operate secure transactions.  ... 
doi:10.54155/jbs.25.2.41-57 fatcat:yim7nmnc25e5ddv2vyvenaw6da

Emerging Value Propositions For M-Commerce

Irvine Clarke III
1970 Journal of business strategies  
Mobile e-commerce,commonly referred to as m-commerce, is the ability to purchase goodsanywhere through a wireless Internet-enabled device.  ...  , and personalization.  ...  One example, is the SIM (Subscriber Identification Module 0) smartcards which serve as a mobile database allowing the user to run applications and operate secure transactions.  ... 
doi:10.54155/jbs.18.2.133-148 fatcat:tnzrpqtyy5h53cjtzqjr6c4ohi

The Hybridization of Automatic Identification Techniques in Mass Market Applications: Towards a Model of Coexistence

Katina Michael, MG Michael, Holly Tootell, Valerie Baker
2006 2006 IEEE International Conference on Management of Innovation and Technology  
auto-ID devices.  ...  auto-ID devices.  ...  to only a few authorized persons.  ... 
doi:10.1109/icmit.2006.262381 fatcat:vln4zintvfegpcy2i3ohtswp5u
« Previous Showing results 1 — 15 out of 63 results