273 research outputs found

    Optimal Iris Fuzzy Sketches

    Full text link
    Fuzzy sketches, introduced as a link between biometry and cryptography, are a way of handling biometric data matching as an error correction issue. We focus here on iris biometrics and look for the best error-correcting code in that respect. We show that two-dimensional iterative min-sum decoding leads to results near the theoretical limits. In particular, we experiment our techniques on the Iris Challenge Evaluation (ICE) database and validate our findings.Comment: 9 pages. Submitted to the IEEE Conference on Biometrics: Theory, Applications and Systems, 2007 Washington D

    RFID Key Establishment Against Active Adversaries

    Full text link
    We present a method to strengthen a very low cost solution for key agreement with a RFID device. Starting from a work which exploits the inherent noise on the communication link to establish a key by public discussion, we show how to protect this agreement against active adversaries. For that purpose, we unravel integrity (I)(I)-codes suggested by Cagalj et al. No preliminary key distribution is required.Comment: This work was presented at the First IEEE Workshop on Information Forensics and Security (WIFS'09) (update including minor remarks and references to match the presented version

    A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes

    Get PDF
    With their increasing popularity in cryptosystems, biometrics have attracted more and more attention from the information security community. However, how to handle the relevant privacy concerns remains to be troublesome. In this paper, we propose a novel security model to formalize the privacy concerns in biometric-based remote authentication schemes. Our security model covers a number of practical privacy concerns such as identity privacy and transaction anonymity, which have not been formally considered in the literature. In addition, we propose a general biometric-based remote authentication scheme and prove its security in our security model

    Maximising transparency in a doctoral thesis: The complexities of writing about the use of QSR*NVIVO within a grounded theory study

    Get PDF
    This paper discusses the challenges of how to provide a transparent account of the use of the software programme QSR*NVIVO (QSR 2000) within a Grounded Theory framework (Glaser and Strauss 1967; Strauss and Corbin 1998). Psychology students are increasingly pursuing qualitative research projects such to the extent that the UK Economic and Social Research Council (ESRC) advise that students should have skill in the use of computer assisted qualitative data analysis software (CAQDAS) (Economic and Social Research Council 2001). Unlike quantitative studies, rigid formulae do not exist for writing-up qualitative projects for doctoral theses. Most authors, however, agree that transparency is essential when communicating the findings of qualitative research. Sparkes (2001) recommends that evaluative criteria for qualitative research should be commensurable with the aims, objectives, and epistemological assumptions of the research project. Likewise, the use of CAQDAS should vary according to the research methodology followed, and thus researchers should include a discussion of how CAQDAS was used. This paper describes how the evolving process of coding data, writing memos, categorising, and theorising were integrated into the written thesis. The structure of the written document is described including considerations about restructuring and the difficulties of writing about an iterative process within a linear document

    Greater Expectations?

    Get PDF
    Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich verifier, who has access to a database of pre-measured PUF challenge-response pairs (CRPs). In this paper we consider application scenarios where all previous PUF-based authentication schemes fail to work: The verifier is resource-constrained (and holds a PUF), while the prover is resource-rich (and holds a CRP-database). We construct the first and efficient PUF-based authentication protocol for this setting, which we call converse PUF-based authentication. We provide an extensive security analysis against passive adversaries, show that a minor modification also allows for authenticated key exchange and propose a concrete instantiation using controlled Arbiter PUFs

    Limits on the early afterglow phase of gamma-ray burst sources from TAROT-1

    Get PDF
    The T\'elescope \`a Action Rapide pour les Objets Transitoires (TAROT-1) has as prime objective the observation of the prompt and delayed emission of cosmic gamma-ray bursts (GRBs). We have performed a search for optical emission from 6 GRBs detected by BATSE. The positioning error circle was fully covered within typically thirty minutes after the trigger. No detection of the early afterglow phase was made, and magnitude limits in the range of mR=13−15 \mathrm{m}_{\mathrm{R}} = 13-15 were estimated using 20s exposures. These limits are compared to optical afterglow data obtained in later phases and the results are interpreted in terms of source distances. They correspond to a median redshift of z = 0.5. With HETE-2 and the planned instrument upgrade, TAROT-1 will be able to detect the early optical emission of GRBs up to a redshift of the order of 5.Comment: 7 pages, accepted in Astronomy and Astrophysic

    Diurnal salivary cortisol concentrations in Parkinson’s disease: increased total secretion and morning cortisol concentrations

    Get PDF
    Background:Parkinson’s disease (PD) is a chronic neurodegenerative disorder. There is limited knowledge about the function of the hypothalamic-pituitary-adrenal axis in PD. The primary aim of this prospective study was to analyze diurnal salivary cortisol concentrations in patients with PD and correlate these with age, gender, body mass index (BMI), duration of PD, and pain. The secondary aim was to compare the results with a healthy reference group. Methods:Fifty-nine PD patients, 35 women and 24 men, aged 50–79 years, were recruited. The reference group comprised healthy individuals matched for age, gender, BMI, and time point for sampling. Salivary cortisol was collected at 8 am, 1 pm, and 8 pm, and 8 am the next day using cotton-based Salivette ¼tubes and analyzed using Spectria¼Cortisol I125. A visual analog scale was used for estimation of pain. Results:The median cortisol concentration was 16.0 (5.8–30.2) nmol/L at 8 am, 5.8 (3.0–16.4) at 1 pm, 2.8 (1.6–8.0) at 8 pm, and 14.0 (7.5–28.7) at 8 am the next day. Total secretion and rate of cortisol secretion during the day (8 am–8 pm) and the concentration of cortisol on the next morning were lower (12.5 nmol/L) in the reference group. No significant correlations with age, gender, BMI, duration of PD, Hoehn and Yahr score, Unified Parkinson’s Disease Rating Scale III score, gait, pain, or cortisol concentrations were found. Conclusion:The neurodegenerative changes in PD does not seem to interfere with the hypothalamic-pituitary-adrenal axis. Salivary cortisol concentrations in PD patients were increased in the morning compared with the reference group, and were not influenced by motor dysfunction, duration of disease, or coexistence of chronic or acute pain

    ClbP is a prototype of a peptidase subgroup involved in biosynthesis of nonribosomal peptides

    Get PDF
    The pks genomic island of Escherichia coli encodes polyketide (PK) and nonribosomal peptide (NRP) synthases that allow assembly of a putative hybrid PK-NRP compound named colibactin that induces DNA double-strand breaks in eukaryotic cells. The pks-encoded machinery harbors an atypical essential protein, ClbP. ClbP crystal structure and mutagenesis experiments revealed a serine-active site and original structural features compatible with peptidase activity, which was detected by biochemical assays. Ten ClbP homologs were identified in silico in NRP genomic islands of closely and distantly related bacterial species. All tested ClbP homologs were able to complement a clbP-deficient E. coli mutant. ClbP is therefore a prototype of a new subfamily of extracytoplasmic peptidases probably involved in the maturation of NRP compounds. Such peptidases will be powerful tools for the manipulation of NRP biosynthetic pathways

    Secure biometric authentication with improved accuracy

    Get PDF
    We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summarised as follows: (1) potential for much better accuracy using different types of biometric signals, including behavioural ones; and (2) improved user privacy, since user identities are not transmitted at any point in the protocol execution. The new protocol takes advantage of state-of-the-art identification classifiers, which provide not only better accuracy, but also the possibility to perform authentication without knowing who the user claims to be. Cryptographic security is based on the Paillier public key encryption scheme

    The characteristics of sexual abuse in sport: A multidimensional scaling analysis of events described in media reports

    Get PDF
    Most research on sexual abuse has been conducted within family settings (Fergusson & Mullen, 1999). In recent years, following several high profile convictions and scandals, research into sexual abuse has also encompassed institutional and community settings such as sport and the church (Gallagher, 2000; Wolfe et al., 2003). Research into sexual abuse in sport, for example, began with both prevalence studies (Kirby & Greaves, 1996; Leahy, Pretty & Tenenbaum, 2002) and qualitative analyses of the processes and experiences of athlete sexual abuse (Brackenridge, 1997; Cense & Brackenridge, 2001, Toftegaard Nielsen, 2001). From such work, descriptions of the modus operandi of abusers in sport, and the experiences and consequences for athlete victims, have been provided, informing both abuse prevention work and coach education. To date, however, no study has provided empirical support for multiple associations or identified patterns of sex offending in sport in ways that might allow comparisons with research-generated models of offending outside sport. This paper reports on an analysis of 159 cases of criminally defined sexual abuse, reported in the print media over a period of 15 years. The main aim of the study was to identify the nature of sex offending in sport focusing on the methods and locations of offences. The data were analysed using multidimensional scaling (MDS), as a data reduction method, in order to identify the underlying themes within the abuse and explore the inter-relationships of behaviour, victim and context variables. The findings indicate that there are specific themes that can be identified within the perpetrator strategies that include ‘intimate’, ‘aggressive’, and ‘’dominant’ modes of interaction. The same patterns that are described here within the specific context of sport are consistent with themes that emerge from similar behavioural analyses of rapists (Canter & Heritage, 1990; Bishopp, 2003) and child molester groups (Canter, Hughes & Kirby, 1998). These patterns show a correspondence to a broader behavioural model – the interpersonal circumplex (e.g., Leary 1957). Implications for accreditation and continuing professional education of sport psychologists are noted
    • 

    corecore