Public Key Infrastructure of Electronic Bidding System using the Fingerprint Information
نویسندگان
چکیده
منابع مشابه
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture
1University of the Aegean, Department of Information and Communication Systems, Karlovassi GR-832 00, Greece, {sgritz, ska,dlek}@aegean.gr . 2Technological Education Institute of Athens, Department of Informatics,Ag. Spiridonos St.,Aegaleo GR-122 10, Greece. 3Data Protection Commission, 8 Omirou St.,Athens GR-105 64, Greece. 4Athens University of Economics & Business, Department of Informatics,...
متن کاملThe Internet public key infrastructure
Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data security in electronic computers employed some of the same transformations. Modern secret key cryptography brought much greater security, but eventually proved vulnerable to brute-force attacks. Public key cryptography has now emerged as the core technology for modern comp...
متن کاملEstimating the Future of Electronic Health Information System in Society
Background: The health information system provides an integrated platform and an information connection between the actors of the health system regardless of temporal and spatial limitations. Objective This study aims to investigate the factors affecting the development of electronic health record (EHR) system and predict the future of this system in Iran. Methods: In this descriptive study, ...
متن کاملA Secure Electronic Payment System Based on Efficient Public Key Infrastructure
At present, electronic payment activities constructed on the Internet mainly employ the certificate-based public key cryptosystems to solve related security issues. But it is based on the condition that the certificate authority (CA) must be honest and needs to manage the key directory. Furthermore, it needs to spend extra time to verify the signature signed in the digital certificate by the CA...
متن کاملConverting Fingerprint Local Features to Public Key Using Fuzzy Extractor
Biometric security systems are being widely used for ensuring maximum level of safety. In Biometric system, neither the data is uniformly distributed, nor can it be reproduced precisely. Each time it is processed. However, this processed data cannot be used as a password or as a cryptography secret. This paper proposes a novel method to extract fingerprint minutiae features and converting it to...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of the Korea Contents Association
سال: 2012
ISSN: 1598-4877
DOI: 10.5392/jkca.2012.12.02.069