8,019 research outputs found

    Fair electronic exchange using biometrics

    Get PDF
    Fair exchange between two parties can be defined as an instance of exchange such that either both parties obtain what they expected or neither one does. Protocols that facilitate such transactions are known as “fair exchange protocols”. We analyze one such protocol by Micali that demonstrates fair contract signing, where two parties exchange their commitments over an already negotiated contract. In this research we show that Micali’s protocol is not completely fair and demonstrate the possibilities for one party cheating by obtaining the other party’s commitment and not offer theirs. A revised version of this protocol by Bao provides superior fairness by handling the above mentioned weakness but fails to handle the possibility of a replay attack. Our proposed protocol improves on Bao’s protocol by addressing the weakness that leads to a replay attack. We also demonstrate a software implementation of our system which provides fair contract signing along with properties like user authentication achieved through the use of a fingerprint based authentication system and features like confidentiality, data-integrity and non-repudiation achieved through implementation of hybrid cryptography and digital signatures algorithms based on Elliptic Curve Cryptography

    Quantum surveillance and 'shared secrets'. A biometric step too far? CEPS Liberty and Security in Europe, July 2010

    Get PDF
    It is no longer sensible to regard biometrics as having neutral socio-economic, legal and political impacts. Newer generation biometrics are fluid and include behavioural and emotional data that can be combined with other data. Therefore, a range of issues needs to be reviewed in light of the increasing privatisation of ‘security’ that escapes effective, democratic parliamentary and regulatory control and oversight at national, international and EU levels, argues Juliet Lodge, Professor and co-Director of the Jean Monnet European Centre of Excellence at the University of Leeds, U

    Biometric Boom: How the Private Sector Commodifies Human Characteristics

    Get PDF
    Biometric technology has become an increasingly common part of daily life. Although biometrics have been used for decades, recent ad- vances and new uses have made the technology more prevalent, particu- larly in the private sector. This Note examines how widespread use of biometrics by the private sector is commodifying human characteristics. As the use of biometrics has become more extensive, it exacerbates and exposes individuals and industry to a number of risks and problems asso- ciated with biometrics. Despite public belief, biometric systems may be bypassed, hacked, or even fail. The more a characteristic is utilized, the less value it will hold for security purposes. Once compromised, a biome- tric cannot be replaced as would a password or other security device. This Note argues that there are strong justifications for a legal struc- ture that builds hurdles to slow the adoption of biometrics in the private sector. By examining the law and economics and personality theories of commodification, this Note identifies market failure and potential harm to personhood due to biometrics. The competing theories justify a reform to protect human characteristics from commodification. This Note presents a set of principles and tools based on defaults, disclosures, incen- tives, and taxation to discourage use of biometrics, buying time to streng- then the technology, educate the public, and establish legal safeguards for when the technology is compromised or fails

    Balancing Security and Democracy: The Politics of Biometric Identification in the European Union

    Get PDF
    What are the relations between security policies and democratic debate, oversight and rights? And what is the role of expertise in shaping such policies and informing the democratic process? The inquiry that follows tries to answer such questions in the context of the European Union and taking the case of biometric identification, an area where security considerations and the possible impacts on fundamental rights and rule of law are at stake, and where expertise is crucial. Some hypotheses are explored through the case study: that 'securitisation' and 'democratisation' are in tension but some hybrid strategies can emerge, that the plurality of 'authoritative actors' influences policy frames and outcomes, and that knowledge is a key asset in defining these authoritative actors. A counter-intuitive conclusion is presented, namely that biometrics-which seems prima facie an excellent candidate for technocratic decision making, sheltered from democratic debate and accountability-is characterised by intense debate by a plurality of actors. Such pluralism is limited to those actors who have the resources-including knowledge-that allow for inclusion in policy making at EU level, but is nevertheless significant in shaping policy. Tragic events were pivotal in pushing for action on grounds of security, but the chosen instruments were in store and specific actors were capable of proposing them as a solution to security problems; in particular, the strong role of executives is a key factor in the vigorous pursuit of biometric identification. However this is not the whole story, and limited pluralism-including plurality of expertise-explains specific features of the development of biometrics in the EU, namely the central role of the metaphor of 'balancing' security and democracy, and the 'competitive cooperation' between new and more consolidated policy areas. The EU is facing another difficult challenge in the attempt of establishing itself as a new security actor and as a supranational democratic polity: important choices are involved to assure that citizens' security is pursued on the basis of rule of law, respect of fundamental rights and democratic accountability.democracy; pluralism; security/internal

    Success factors for managing purchasing groups: an empirical survey

    Get PDF
    In this article, we identify success factors for managing small and intensive purchasing groups by comparing successful and unsuccessful Dutch purchasing groups in a large-scale survey. Transaction costs economics and social exchange theory are used as theoretical frameworks for our broad empirical investigation. We found that the success factors studied that are related to interorganizational trust, the formality of the group, and uniformity of the group members are not success factors for managing purchasing groups. For our data set, the most important success factors are no enforced participation, sufficient total contribution of efforts, all members contribute knowledge, all members rarely change representatives, fair allocation of savings, and communication. We discuss the academic and practical implications of the success factors found

    Trends in Banking 2017 and onwards

    Get PDF
    The changing nature of the relationship between a retail bank and its customers is examined, particularly with respect to new financial concepts, debt and regulation. The traditional image of a bank is portrayed as a physical building a classical Doric portico. This image conveys concepts of service, soundness, strength, stability and security ("five-S"). That "five-S" concept is changing, and the evidence for changes that affect customers directly is considered. A fundamental legal problem associated with those changes is highlighted: a bank is no longer solely responsible for the safeguard of customer monies. A solution to this problem is proposed: banks should be jointly liable with perpetrators of criminal activity in the event of frauds as an encouragement to recognise and mitigate fraud.Comment: Proceedings 29th SASE Conference, Lyon France, June-July 201

    07421 Abstracts Collection -- Formal Protocol Verification Applied

    Get PDF
    From 14/10/2007 to 19/10/2007, the Dagstuhl Seminar 07421 ``Formal Protocol Verification Applied\u27\u27 was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available

    Unique Identity Project in India: A Divine Dream or a Miscalculated Heroism?

    Get PDF
    The Unique Identity Project in India is a flagship project as being highlighted by the Government of India and is being portrayed as a panacea for all ills that exist in the country. Although time can only tell about the efficiency and efficacy of the project, but the very launch of this exercise has made it the largest biometric based identity disbursing e-government project in the globe. This paper, tries to put the current UID project of India into a perspective to evaluate the set of issues and concerns, as pointed by various stakeholders and try to understand the degree of criticality of those arguments. In this light, the areas of concerns around the UID project in India are also being pointed out. Given the largest IT project in nay government globally, the topic is of immense significance besides being timely and the discussion can provide impetus to a series of research activities in the areas of public policy, Information Systems planning and execution as well as appreciating the risks that get associated with such large initiatives.

    Biometrics Institute 20th Anniversary Report

    Get PDF
    The purpose of this report is to mark the 20-year anniversary of the Biometrics Institute on the 11 October 2021. More importantly, however, this report celebrates the work of the Biometrics Institute over the past twenty years, which together with the support of its members, has provided a platform for a balanced discussion promoting the responsible and ethical use of biometrics and a deeper understanding of the biometrics industry
    • 

    corecore