441 research outputs found

    Optimal Iris Fuzzy Sketches

    Full text link
    Fuzzy sketches, introduced as a link between biometry and cryptography, are a way of handling biometric data matching as an error correction issue. We focus here on iris biometrics and look for the best error-correcting code in that respect. We show that two-dimensional iterative min-sum decoding leads to results near the theoretical limits. In particular, we experiment our techniques on the Iris Challenge Evaluation (ICE) database and validate our findings.Comment: 9 pages. Submitted to the IEEE Conference on Biometrics: Theory, Applications and Systems, 2007 Washington D

    RFID Key Establishment Against Active Adversaries

    Full text link
    We present a method to strengthen a very low cost solution for key agreement with a RFID device. Starting from a work which exploits the inherent noise on the communication link to establish a key by public discussion, we show how to protect this agreement against active adversaries. For that purpose, we unravel integrity (I)(I)-codes suggested by Cagalj et al. No preliminary key distribution is required.Comment: This work was presented at the First IEEE Workshop on Information Forensics and Security (WIFS'09) (update including minor remarks and references to match the presented version

    Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer

    Get PDF
    open access articleBringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses Oblivious Transfer and provides security in the semi-honest model. The other scheme uses Committed Oblivious Transfer and is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometric authentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form. In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, our attack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance which is different from the actual value. For biometric authentication systems, this attack allows a malicious adversary to pass the authentication without knowledge of the honest user's input with at most O(n)O(n) complexity instead of O(2n)O(2^n), where nn is the input length. We propose an enhanced version of their protocol where this attack is eliminated. The security of our modified protocol is proven using the simulation-based paradigm. Furthermore, as for efficiency concerns, the modified protocol utilizes Verifiable Oblivious Transfer which does not require the commitments to outputs which improves its efficiency significantly

    Observational constraints on the afterglow of GRB 020531

    Get PDF
    We present the data acquired by the TAROT automated observatory on the afterglow of GRB 020531. Up to now, no convincing afterglow emission has been reported for this short/hard GRB at any wavelength, including X-ray and optical. The combination of our early limits, with other published data allows us to put severe constraints on the afterglow magnitude and light curve. The limiting magnitude is 18.5 in R band, 88 minutes after the GRB, and the decay slope power law index could be larger than 2.2.Comment: 4 pages, submitted to A&A (letter

    Maximising transparency in a doctoral thesis: The complexities of writing about the use of QSR*NVIVO within a grounded theory study

    Get PDF
    This paper discusses the challenges of how to provide a transparent account of the use of the software programme QSR*NVIVO (QSR 2000) within a Grounded Theory framework (Glaser and Strauss 1967; Strauss and Corbin 1998). Psychology students are increasingly pursuing qualitative research projects such to the extent that the UK Economic and Social Research Council (ESRC) advise that students should have skill in the use of computer assisted qualitative data analysis software (CAQDAS) (Economic and Social Research Council 2001). Unlike quantitative studies, rigid formulae do not exist for writing-up qualitative projects for doctoral theses. Most authors, however, agree that transparency is essential when communicating the findings of qualitative research. Sparkes (2001) recommends that evaluative criteria for qualitative research should be commensurable with the aims, objectives, and epistemological assumptions of the research project. Likewise, the use of CAQDAS should vary according to the research methodology followed, and thus researchers should include a discussion of how CAQDAS was used. This paper describes how the evolving process of coding data, writing memos, categorising, and theorising were integrated into the written thesis. The structure of the written document is described including considerations about restructuring and the difficulties of writing about an iterative process within a linear document

    A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes

    Get PDF
    With their increasing popularity in cryptosystems, biometrics have attracted more and more attention from the information security community. However, how to handle the relevant privacy concerns remains to be troublesome. In this paper, we propose a novel security model to formalize the privacy concerns in biometric-based remote authentication schemes. Our security model covers a number of practical privacy concerns such as identity privacy and transaction anonymity, which have not been formally considered in the literature. In addition, we propose a general biometric-based remote authentication scheme and prove its security in our security model

    Experimental test of scaling of mixing by chaotic advection in droplets moving through microfluidic channels

    Get PDF
    This letter describes an experimental test of a simple argument that predicts the scaling of chaotic mixing in a droplet moving through a winding microfluidic channel. Previously, scaling arguments for chaotic mixing have been described for a flow that reduces striation length by stretching, folding, and reorienting the fluid in a manner similar to that of the baker’s transformation. The experimentally observed flow patterns within droplets (or plugs) resembled the baker’s transformation. Therefore, the ideas described in the literature could be applied to mixing in droplets to obtain the scaling argument for the dependence of the mixing time, t ∌ (aw/U)log(Pe), where w [m] is the cross-sectional dimension of the microchannel, a is the dimensionless length of the plug measured relative to w, U [m s^−1] is the flow velocity, Pe is the PĂ©clet number (Pe = wU/D), and D [m^2 s^−1] is the diffusion coefficient of the reagent being mixed. Experiments were performed to confirm the scaling argument by varying the parameters w, U, and D. Under favorable conditions, submillisecond mixing has been demonstrated in this system

    Microfluidic Systems for Chemical Kinetics that Rely on Chaotic Mixing in Droplets

    Get PDF
    This paper reviews work on a microïŹ‚uidic system that relies on chaotic advection to rapidly mix multiple reagents isolated in droplets (plugs). Using a combination of turns and straight sections, winding microïŹ‚uidic channels create unsteady ïŹ‚uid ïŹ‚ows that rapidly mix the multiple reagents contained within plugs. The scaling of mixing for a range of channel widths, ïŹ‚ow velocities and diïŹ€usion coeïŹƒcients has been investigated. Due to rapid mixing, low sample consumption and transport of reagents with no dispersion, the system is particularly appropriate for chemical kinetics and biochemical assays. The mixing occurs by chaotic advection and is rapid (sub-millisecond), allowing for an accurate description of fast reaction kinetics. In addition, mixing has been characterized and explicitly incorporated into the kinetic model

    Greater Expectations?

    Get PDF
    Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich verifier, who has access to a database of pre-measured PUF challenge-response pairs (CRPs). In this paper we consider application scenarios where all previous PUF-based authentication schemes fail to work: The verifier is resource-constrained (and holds a PUF), while the prover is resource-rich (and holds a CRP-database). We construct the first and efficient PUF-based authentication protocol for this setting, which we call converse PUF-based authentication. We provide an extensive security analysis against passive adversaries, show that a minor modification also allows for authenticated key exchange and propose a concrete instantiation using controlled Arbiter PUFs

    A multi-modal biofeedback protocol to demonstrate physiological manifestations of psychological stress and introduce heart rate variability biofeedback stress management

    Get PDF
    Physiological monitoring solutions and biofeedback technologies allow sport psychology practitioners to demonstrate physiological changes due to psychological stress, and provide their clients with an enhanced awareness of their stress response. These technologies can also provide evidence for the efficacy of stress management techniques, whether cognitive or physiological in nature. In this article, we present a protocol that uses multiple physiological signals to demonstrate how psychological stress can manifest in the body, and then evidence heart rate variability biofeedback as a stress management technique. Using insights from applied consultations, we focus on the delivery of the protocol through phases of baseline resting measures, stressor tasks, and post-stressor recovery. This article provides an accessible use of physiological monitoring and biofeedback technologies in sport psychology practice, so that practitioners may adopt and adapt this protocol for their purposes and available equipment
    • 

    corecore