60 research outputs found

    Future Security Approaches and Biometrics

    Get PDF
    Threats to information security are proliferating rapidly, placing demanding requirements on protecting tangible and intangible business and individual assets. Biometrics can improve security by replacing or complementing traditional security technologies. This tutorial discusses the strengths and weaknesses of biometrics and traditional security approaches, current and future applications of biometrics, performance evaluation measures of biometric systems, and privacy issues surrounding the new technology

    Becoming Artifacts: Medieval Seals, Passports and the Future of Digital Identity

    Get PDF
    What does a digital identity token have to do with medieval seals? Is the history of passports of any use for enabling the discovery of Internet users\u27 identity when crossing virtual domain boundaries during their digital browsing and transactions? The agility of the Internet architecture and its simplicity of use have been the engines of its growth and success with the users worldwide. As it turns out, there lies also its crux. In effect, Internet industry participants have argued that the critical problem business is faced with on the Internet is the absence of an identity layer from the core protocols of its logical infrastructure. As a result, the cyberspace parallels a global territory without any identification mechanism that is reliable, consistent and interoperable across domains. This dissertation is an investigation of the steps being taken by Internet stakeholders in order to resolve its identity problems, through the lenses of historical instances where similar challenges were tackled by social actors. Social science research addressing the Internet identity issues is barely nascent. Research on identification systems in general is either characterized by a paucity of historical perspective, or scantily references digital technology and online identification processes. This research is designed to bridge that gap. The general question at its core is: How do social actors, events or processes enable the historical emergence of authoritative identity credentials for the public at large? This work is guided by that line of inquiry through three broad historical case studies: first, the medieval experience with seals used as identity tokens in the signing of deeds that resulted in transfers of rights, particularly estate rights; second, comes the modern, national state with its claim to the right to know all individuals on its territory through credentials such as the passport or the national identity card; and finally, viewed from the United States, the case of ongoing efforts to build an online digital identity infrastructure. Following a process-tracing approach to historical case study, this inquiry presents enlightening connections between the three identity frameworks while further characterizing each. We understand how the medieval doctrines of the Trinity and the Eucharist developed by schoolmen within the Church accommodated seals as markers of identity, and we understand how the modern state seized on the term `nationality\u27 - which emerged as late as in the 19th century - to make it into a legal fiction that was critical for its identification project. Furthermore, this investigation brings analytical insights which enable us to locate the dynamics driving the emergence of those identity systems. An ordering of the contributing factors in sequential categories is proposed in a sociohistorical approach to explain the causal mechanisms at work across these large phenomena. Finally this research also proposes historically informed projections of scenarios as possible pathways to the realization of authoritative digital identity. But that is the beginning of yet another story of identity

    Device profiling analysis in Device-Aware Network

    Get PDF
    As more and more devices with a variety of capabilities are Internet-capable, device independence becomes a big issue when we would like the information that we request to be correctly displayed. This thesis introduces and compares how existing standards create a profile that describes the device capabilities to achieve the goal of device independence. After acknowledging the importance of device independence, this paper utilizes the idea to introduce a Device-Aware Network (DAN). DAN provides the infrastructure support for device-content compatibility matching for data transmission. We identify the major components of the DAN architecture and issues associated with providing this new network service. A Device-Aware Network will improve the network's efficiency by preventing unusable data from consuming host and network resources. The device profile is the key issue to achieve this goal.http://archive.org/details/deviceprofilingn109451301Captain, Taiwan ArmyApproved for public release; distribution is unlimited

    Near Field Communication: From theory to practice

    Get PDF
    This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab - Istanbul research centre which conducts intense research on NFC technology. In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technology, and security considerations are discussed in detail. Key Features: Offers a complete understanding of the NFC technology, including standards, technical essentials, operating modes, application development with Java, security and privacy, business ecosystem analysis Provides analysis, design as well as development guidance for professionals from administrative and technical perspectives Discusses methods, techniques and modelling support including UML are demonstrated with real cases Contains case studies such as payment, ticketing, social networking and remote shopping This book will be an invaluable guide for business and ecosystem analysts, project managers, mobile commerce consultants, system and application developers, mobile developers and practitioners. It will also be of interest to researchers, software engineers, computer scientists, information technology specialists including students and graduates.Publisher's Versio

    A Systematic Review of Blockchain Applications

    Get PDF
    For this study, the researchers conducted a systematic literature review to answer complex questions about the field of blockchain technology. We used an unbiased systematic review process to find works on blockchain-based applications and developed a Python code that searched various online databases. This paper provides an overview of the characteristics, mode of operation, and applications of blockchains in various domains such as transportation, commerce and industry, privacy and security, the financial sector, government, education, healthcare, and the Internet of Things (IoT). The aim was to identify the key research themes addressed in existing articles within each application domain and suggest future research directions for these domains. We analyzed a set of 750 articles published between 2015 and 2021 that dealt with blockchain applications. We found that financial management and security issues have been the main research focus since 2015. However, the use of blockchain in education has become a central research theme in 2021. Healthcare, IoT, and government applications have also grown in popularity. We furthermore analyzed some of the implementations of privacy mechanisms, as well as the challenges and future directions that need to be addressed for effective blockchain deployment. This study contributes to existing research by providing a comprehensive overview of blockchain application themes and their emerging areas for stakeholders in diverse sectors.V rámci této studie provedli výzkumníci systematický přehled literatury, aby zodpověděli komplexní otázky týkající se technologie blockchain. K vyhledání prací o aplikacích založených na blockchainu jsme použili nezaujatý proces systematického přehledu a vyvinuli jsme kód v jazyce Python, který prohledával různé online databáze. Tento článek poskytuje přehled charakteristik, způsobu fungování a aplikací blockchainů v různých oblastech, jako je doprava, obchod a průmysl, ochrana soukromí a bezpečnost, finanční sektor, státní správa, vzdělávání, zdravotnictví a internet věcí (IoT). Cílem bylo identifikovat klíčová témata výzkumu, kterými se zabývají existující články v rámci jednotlivých aplikačních domén, a navrhnout budoucí směry výzkumu pro tyto domény. Analyzovali jsme soubor 750 článků publikovaných v letech 2015 až 2021, které se zabývaly aplikacemi blockchainu. Zjistili jsme, že od roku 2015 se výzkum zaměřuje především na otázky finanční správy a bezpečnosti. V roce 2021 se však ústředním tématem výzkumu stalo využití blockchainu ve vzdělávání. Rostla také popularita aplikací ve zdravotnictví, internetu věcí a státní správě. Dále jsme analyzovali některé z implementací mechanismů ochrany soukromí a také výzvy a budoucí směry, které je třeba řešit pro efektivní nasazení blockchainu. Tato studie přispívá ke stávajícímu výzkumu tím, že poskytuje ucelený přehled témat aplikací blockchainu a jejich nově vznikajících oblastí pro zúčastněné strany v různých odvětvích

    Mobile security and smart systems

    Get PDF

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license

    Blockchain Technology for Intelligent Transportation Systems: A Systematic Literature Review

    Get PDF
    The use of Blockchain technology has recently become widespread. It has emerged as an essential tool in various academic and industrial fields, such as healthcare, transportation, finance, cybersecurity, and supply chain management. It is regarded as a decentralized, trustworthy, secure, transparent, and immutable solution that innovates data sharing and management. This survey aims to provide a systematic review of Blockchain application to intelligent transportation systems in general and the Internet of Vehicles (IoV) in particular. The survey is divided into four main parts. First, the Blockchain technology including its opportunities, relative taxonomies, and applications is introduced; basic cryptography is also discussed. Next, the evolution of Blockchain is presented, starting from the primary phase of pre-Bitcoin (fundamentally characterized by classic cryptography systems), followed by the Blockchain 1.0 phase, (characterized by Bitcoin implementation and common consensus protocols), and finally, the Blockchain 2.0 phase (characterized by the implementation of smart contracts, Ethereum, and Hyperledger). We compared and identified the strengths and limitations of each of these implementations. Then, the state of the art of Blockchain-based IoV solutions (BIoV) is explored by referring to a large and trusted source database from the Scopus data bank. For a well-structured and clear discussion, the reviewed literature is classified according to the research direction and implemented IoV layer. Useful tables, statistics, and analysis are also presented. Finally, the open problems and future directions in BIoV research are summarized
    corecore