Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- D5.1: A survey on legislation on ID theft in the EU and….
- D5.2: ID Fraud Workshop.
- D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
- D5.2c: Identity related crime in the world of films.
- D5.3: A Multidisciplinary Article on Identity-related Crime.
- D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
- D6.1: Forensic Implications of Identity Management Systems.
- D6.5/D6.6: Second thematic Workshop forensic implications.
- D6.7b: Workshop on Forensic Profiling.
- D6.7c: Forensic Profiling.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research
Index of Figures
Figure 1. ID fraud sequence, taken from Mitchison (2004, p. 21 ) 13
Figure 2. Phishing example impersonating CitiBank. 18
Figure 3. Sniffing example. 20
Figure 4. Introduced terms and their relationship 49
Figure 5. Requirement engineering process 64
Figure 6. Authentication of a Human by an IT System. 70
Figure 7. Authentication of an IT System by a Human. 72
Figure 8. Authentication procedures between persons and IT Systems. 73
Figure 9. Testing area of the scenario: The field of view and the human’s walking direction are depicted. 76
Figure 10. Hardware equipment of the scenario. 76
Figure 11. Image of iris spoofed by low resolution print and also possibilities with fun lenses for enrolment and access control 79
Figure 12. Silicon casts of fingerprints with silicon cast negative and acrylate paint as positive. 80
Figure 13. Fingerprint access with copy of fingerprint on scanner “Digital Persona”. 80
Figure 14. Keys managed by the TPM. 95
Figure 15. Use of pseudonyms certified by a Trusted Third Party and encrypted using the TPM 96
Figure 16. Sample taxonomy 99
Denis Royer | 44 / 44 |