Scan Science and Technology
Contact Leading Edge Experts & Companies
Additional Security Measure
The Experts below are selected from a list of 51 Experts worldwide ranked by ideXlab platform
Hayder Hussein Azeez – 1st expert on this subject based on the ideXlab platform
implementing Additional Security Measure on atm through biometric, 2011Co-Authors: Hayder Hussein AzeezAbstract:
With the development of computer network technology and e-commerce, the self-service banking system has got extensive generalization with the characteristic offering high-quality 24 hours service for customer. Nowadays, using the ATM (Automatic Teller Machine) which provides customers with
the convenient banknote trading is very common. However, the financial crime case rises repeatedly in recent years. A lot of criminals tamper with the ATM and steal user’s credit card and password by illegal means, Once user’s bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer. How to carry on the valid identity to the customer becomes the focus in current financial circle. Traditional ATM systems authenticate generally by using the credit card and the password, the method has some defects. Using credit card and password
cannot verify the client’s identity exactly. In recent years, Biometric systems, fingerprint technology in particular, can give the possibility to develop a system of protection in ATM machines.
Cheman Shaik – 2nd expert on this subject based on the ideXlab platform
Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key CompromiseEC2ND 2006, 2007Co-Authors: Cheman ShaikAbstract:
A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an Additional Security Measure that enables encryptions to survive private key compromise attacks.
A. Kannammal – 3rd expert on this subject based on the ideXlab platform
ECC Based Biometric Encryption of Compressed Image for Security over Network ChannelsLecture Notes in Electrical Engineering, 2013Co-Authors: B. Prasanalakshmi, A. KannammalAbstract:
This paper provides a way for secure transmission of data over networks. The Security is initialized by means of using biometric data as private key, imposing the biometric data compression using 5- level Discrete wavelet transform is a way to minimize the key length, which were of large length as the standard requirements for implementing via RSA based hardware and software. As Additional Security Measure Elliptic curve cryptography is used to encrypt the biometric data that is to be stored in and accessed from the database over networks.