Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
D3.1: Overview on IMS.
D3.2: A study on PKI and biometrics.
D3.3: Study on Mobile Identity Management.
D3.5: Workshop on ID-Documents.
D3.6: Study on ID Documents.
D3.7: A Structured Collection on RFID Literature.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
D3.10: Biometrics in identity management.
D3.11: Report on the Maintenance of the IMS Database.
D3.15: Report on the Maintenance of the ISM Database.
D3.17: Identity Management Systems – recent developments.
D12.1: Integrated Workshop on Emerging AmI Technologies.
D12.2: Study on Emerging AmI Technologies.
D12.3: A Holistic Privacy Framework for RFID Applications.
D12.4: Integrated Workshop on Emerging AmI.
D12.5: Use cases and scenarios of emerging technologies.
D12.6: A Study on ICT Implants.
D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
D12.10: Normality Mining: Results from a Tracking Study.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D3.2: A study on PKI and biometrics
Table Of Content
- Executive Summary
- Introduction
- The Importance of the Authentication Process
- PKI as a Logical Basis for a Secure Authentication Infrastructure
- The Weak Link in the Authentication & Verification Chain
- Document Scope and Content
- Public-Key Infrastructures and Digital Signatures
- Introduction
- Basic Definitions of Terms
- Digital Signature Schemes: Technical Aspects
- Security of Digital Signature Schemes
- Signature Schemes with Additional Properties
- Security and Privacy Aspects
- Security Aspects
- Privacy Aspects
- Legal aspects of
- Electronic Signatures According to EU Directives
- Legal Provisions on the use of Pseudonyms for Electronic Signatures
- Economic Theory
- Rate of Adoption of Qualified Electronic Signatures
- Qualified Electronic Signatures in the Innovation-Decision Process
- Analysis of Current Efforts to Diffuse Qualified Electronic Signatures
- Case Study: Mobile Signatures
- Server Based Electronic Signatures
- Client Based Electronic Signatures
- Certification on Demand
- Special Aspects of Mobile Signatures
- Summary and Conclusions
- Biometrics
- Introduction
- Biometric Methodologies
- Physiological (or Passive) Methods
- Iris recognition
- Behavioural (or Active) Methods
- Soft Biometrics
- Security and Privacy Aspects
- Security Aspects
- Will biometrics help?
- Biometrics and cryptography
- Privacy Aspects
- Privacy criteria
- Current Privacy Research Applied to Biometrics
- Biometric Credentials
- Case Study: Secure Storage Biometric Smart Cards
- Broader Social, Political and Economic Implications
- Biometrics as a Solution to What?
- A Social, Political and Economic Outlook
- Summary and Conclusions
- Enhancing PKIs using Biometrics
- The BEE Recommendations (IST-20078 BEE) and BioVision
- Summary
- Conclusion
- References
- Acronyms and Glossary
- Appendix 1: Analytical Steps for Genetic Fingerprinting
- Appendix 2: The Eigenface Approach
- Appendix 3: Details of the Hidden Markov Model