Public Key Infrastructure of Electronic Bidding System using the Fingerprint Information

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture

1University of the Aegean, Department of Information and Communication Systems, Karlovassi GR-832 00, Greece, {sgritz, ska,dlek}@aegean.gr . 2Technological Education Institute of Athens, Department of Informatics,Ag. Spiridonos St.,Aegaleo GR-122 10, Greece. 3Data Protection Commission, 8 Omirou St.,Athens GR-105 64, Greece. 4Athens University of Economics & Business, Department of Informatics,...

متن کامل

The Internet public key infrastructure

Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data security in electronic computers employed some of the same transformations. Modern secret key cryptography brought much greater security, but eventually proved vulnerable to brute-force attacks. Public key cryptography has now emerged as the core technology for modern comp...

متن کامل

Estimating the Future of Electronic Health Information System in Society

Background: The health information system provides an integrated platform and an information connection between the actors of the health system regardless of temporal and spatial limitations. Objective This study aims to investigate the factors affecting the development of electronic health record (EHR) system and predict the future of this system in Iran. Methods: In this descriptive study, ...

متن کامل

A Secure Electronic Payment System Based on Efficient Public Key Infrastructure

At present, electronic payment activities constructed on the Internet mainly employ the certificate-based public key cryptosystems to solve related security issues. But it is based on the condition that the certificate authority (CA) must be honest and needs to manage the key directory. Furthermore, it needs to spend extra time to verify the signature signed in the digital certificate by the CA...

متن کامل

Converting Fingerprint Local Features to Public Key Using Fuzzy Extractor

Biometric security systems are being widely used for ensuring maximum level of safety. In Biometric system, neither the data is uniformly distributed, nor can it be reproduced precisely. Each time it is processed. However, this processed data cannot be used as a password or as a cryptography secret. This paper proposes a novel method to extract fingerprint minutiae features and converting it to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of the Korea Contents Association

سال: 2012

ISSN: 1598-4877

DOI: 10.5392/jkca.2012.12.02.069