Security Mechanisms and Access Control Infrastructure for Biometrics Passport using Cryptographic Protocols
نویسندگان
چکیده
منابع مشابه
Security Mechanisms and Access Control Infrastructure for Biometrics Passport using Cryptographic Protocols
Electronic passports (e-passports) are to prevent the illegal entry of traveller into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The epassport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and biometrics (face, fingerprints, palm prints and iris). A pa...
متن کاملEfficient Implementation of Electronic Passport Scheme Using Cryptographic Security Along With Multiple Biometrics
Electronic passports have known a wide and fast deployment all around the world since the International Civil Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the ...
متن کاملEvolution of Electronic Passport Scheme using Cryptographic Protocol along with Biometrics Authentication System
Millions of citizens around the world have already acquired their new electronic passport. The epassport is equipped with contactless chip which stores personal data of the passport holder, information about the passport and the issuing institution, as well as with a multiple biometrics enabling cryptographic functionality. Countries are required to build a Public Key Infrastructure, biometric ...
متن کاملSecurity Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents
Traditional paper documents are not likely to disappear in the near future as they are present everywhere in daily life, however, paper-based documentation lacks the link with the digital world for agile and automated processing. At the same time it is prone to cloning, alteration and counterfeiting attacks. E-passport defined by ICAO and implemented in 45 countries is the most relevant case of...
متن کاملSecurity proofs of cryptographic protocols
We live in time of computers and scientific and technological progress but this time is also marked with many attacks on big Internet companies. So with expand of Internet people start to protect information that they exchange through Internet. In the Internet world it is necessary for systems as Internet banking, Internet shopping or e-commerce to secure private information that are transferre...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Intelligent Systems and Applications
سال: 2013
ISSN: 2074-904X,2074-9058
DOI: 10.5815/ijisa.2013.10.10