The Experts below are selected from a list of 51 Experts worldwide ranked by ideXlab platform
Hayder Hussein Azeez - One of the best experts on this subject based on the ideXlab platform.
-
implementing Additional Security Measure on atm through biometric
2011Co-Authors: Hayder Hussein AzeezAbstract:With the development of computer network technology and e-commerce, the self-service banking system has got extensive generalization with the characteristic offering high-quality 24 hours service for customer. Nowadays, using the ATM (Automatic Teller Machine) which provides customers with the convenient banknote trading is very common. However, the financial crime case rises repeatedly in recent years. A lot of criminals tamper with the ATM and steal user's credit card and password by illegal means, Once user's bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer. How to carry on the valid identity to the customer becomes the focus in current financial circle. Traditional ATM systems authenticate generally by using the credit card and the password, the method has some defects. Using credit card and password cannot verify the client's identity exactly. In recent years, Biometric systems, fingerprint technology in particular, can give the possibility to develop a system of protection in ATM machines.
Cheman Shaik - One of the best experts on this subject based on the ideXlab platform.
-
Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise
EC2ND 2006, 2007Co-Authors: Cheman ShaikAbstract:A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an Additional Security Measure that enables encryptions to survive private key compromise attacks.
A. Kannammal - One of the best experts on this subject based on the ideXlab platform.
-
ECC Based Biometric Encryption of Compressed Image for Security over Network Channels
Lecture Notes in Electrical Engineering, 2013Co-Authors: B. Prasanalakshmi, A. KannammalAbstract:This paper provides a way for secure transmission of data over networks. The Security is initialized by means of using biometric data as private key, imposing the biometric data compression using 5- level Discrete wavelet transform is a way to minimize the key length, which were of large length as the standard requirements for implementing via RSA based hardware and software. As Additional Security Measure Elliptic curve cryptography is used to encrypt the biometric data that is to be stored in and accessed from the database over networks.
Yaw Marfo Missah - One of the best experts on this subject based on the ideXlab platform.
-
utilizing keystroke dynamics as an Additional Security Measure to password Security in computer web based applications a case study of uew
International Journal of Computer Applications, 2016Co-Authors: Osei Boakye Michael, Yaw Marfo MissahAbstract:Keystroke Dynamics is one of the well-known and economical behavioral biometric developments that attempt to recognize the genuineness of a client when the client invokes his keystrokes from a computer keyboard. The keystrokes pattern helps to determine the typing behaviour of users of the system thus serves as the benchmark for identity verification. This paper displays the use of biometrics to augment traditional passwords Security in computer web-based application systems. The system was evaluated base on these criteria; authenticating legitimate user against imposter user and a guess imposter user of the system. Also, evaluation of character timings was performed to know the best combination of strings to use in setting passwords in systems where keystroke dynamics would be applied in order to achieve high efficiency. This study concludes that the use of keystrokes dynamics in augmenting password Security in computer web-based applications should be embraced. General Terms Keystroke dynamics web-based application.
Amandeep Verma - One of the best experts on this subject based on the ideXlab platform.
-
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model Checker
IOSR Journal of Computer Engineering, 2012Co-Authors: Harpreet Kaur, Amandeep VermaAbstract:An ad hoc network is a momentary network set up by the self-managed nodes that operate and communicate randomly with or without a little support of a network infrastructure. Due to Security vulnerabilities ad hoc networks are defenseless against attacks of malicious nodes as the nodes in these networks are not secured by firewalls. In order to enhance the Security of conventional OLSR Protocol trust is incorporated as Additional Security Measure in the functioning of the protocol. To validate the improved version of the protocol a technique of formal modeling and verification is used by the utilization of established Model Checker I-SPIN and PROMELA language for validation of Trusted Optimized link state Protocol (TOLSR).