Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
D3.1: Overview on IMS.
D3.2: A study on PKI and biometrics.
D3.3: Study on Mobile Identity Management.
D3.5: Workshop on ID-Documents.
D3.6: Study on ID Documents.
D3.7: A Structured Collection on RFID Literature.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
D3.10: Biometrics in identity management.
D3.11: Report on the Maintenance of the IMS Database.
D3.15: Report on the Maintenance of the ISM Database.
D3.17: Identity Management Systems – recent developments.
D12.1: Integrated Workshop on Emerging AmI Technologies.
D12.2: Study on Emerging AmI Technologies.
D12.3: A Holistic Privacy Framework for RFID Applications.
D12.4: Integrated Workshop on Emerging AmI.
D12.5: Use cases and scenarios of emerging technologies.
D12.6: A Study on ICT Implants.
D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
D12.10: Normality Mining: Results from a Tracking Study.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D3.2: A study on PKI and biometrics
References
[ALT03] Alternman, A., “A piece of yourself: ethical issues in biometric identification” Ethics and Information Technology, (5), pp.139-50, 2003.
[AMB03]Erlangen, 2003. See http://www.wi3.uni-erlangen.de/forschung/Biometrie_StateOfTheArt/Biometrie.pdf
[ANG96] Angell, I., “Economic Crime: Beyond Good and Evil”, Journal of Financial Regulation and Compliance, 4 (1), 1996.
[ANG00] Angell, I., “The New Barbarian Manifesto: How to survive the Information Age”, London, Kogan, ISBN 0-7494-3151-2, 2000.
[ANG05] Angell, I., Demetis, D., “Systems Thinking about Anti-Money Laundering: Considering the Greek Case”, Journal of Money Laundering Control, 8 (3), 2005.
[ASW98] Asokan, N., Shoup, Victor, Waidner, Michael, “Optimistic Fair Exchange of Digital Signatures”; In: Proceedings of , pp.591–606, Springer-Verlag, 1998.
[BÄU99]
[BEL99] Bellare, Mihir and Miner, Sara, "A forward-secure digital signature scheme", In: Proceedings of Crypto’99, LNCS 1666, Springer-Verlag, 1999.
[BEN01]
[BEN02] Benecke, M., “Coding or non-coding, that is he question”, EMBO reports vol. 3 no. 6, 2002. See http://www.benecke.com/coding.pdf
[BSI03] Study „BioFace I and II“,German Federal Office for Information Security, Darmstadt 2003.
See http://www.bsi.de/english/publications/BioFace/BioFaceIIReport.pdf
[BSI04]German Federal Office for Information Security, Darmstadt 2004. See http://www.bsi.de/literat/studien/BioFinger/BioFinger_I_I.pdf
[BYR01] Byrd, J. H., Castner J. L., (ed), “The Utility of Arthropods in Legal Investigations”, pp.341-52, CRC Press, Boca Raton, 2001. See http://www.benecke.com/crc2.html
[CAP01] Cap, C. H., Maibaum, N., Heyden, L., “Extending the Data Storage Capabilities of a Java-based Smartcard”, 6th IEEE Symposium on Computers and Communications, Hammamet, Tunesia 3-5 July, 2001.
[CHA90]Chaum, David, van Antwerpen, Hans, “Undeniable Signatures“, In: Proceedings of Crypto ´89, LNCS 435, pp.212-216, Springer-Verlag, Heidelberg, 1990.
[CHA95] David Chaum, “Designated Confirmer Signatures”, In: Proceedings of Eurocrypt´95, LNCS 950, pp.86-91, Springer-Verlag, Berlin, 1995.
[CLA02] Clarke, R., “Biometrics’ Inadequacies and Threats, and the Need for Regulation”, Presentation on the Computers, Freedom & Privacy 2002; see http://www.anu.edu.au/people/Roger.Clarke/DV/BiomThreats.html
[DAU04] Daugman, J., “How Iris recognition works”, IEEE Trans. CSVT 14 (1), pp.21-30, 2004. See http://www.cl.cam.ac.uk/users/jgd1000/irisrecog.pdf
[DAV94] Davies, S., “Touching Big Brother: How Biometric Technology will fuse Flesh and Machine”, Information Technology & People (), 4, pp.38-47, 1994.
[DAV02] Davies, S., “A Year After 9/11: Where are we now?”, Communications of the ACM, 45(9), 2002.
[DEM04] Demetis, D., “The World on Discount”, Journal of the London School of Economics, SU 3 (1), 2004.
[DER03] Pattern Recognition, vol. 36, pp.383-96, 2003.
[DHI96]Dhillon, G., Backhouse, J., “Risks in the use of information technology within organizations”, Int. J. Information Management, 16, 1, pp.65-74, 1996.
[DHI00] Dhillon, G., Backhouse, J., “Information System Security Management in the New Millennium” Communications of the ACM, 43 (7) pp.125-8, 2000.
[FIA87] Fiat, Amos and Shamir, Adi, “How to Prove Yourself: Practical Solutions to Identification and Signature Problems”, In: Proceedings of Crypto´86, LNCS 263, pp.186-194, Springer-Verlag, Berlin 1987.
[FR95] Franklin, Matthew K. and Reiter, Michael K., “Verifiable Signature Sharing”; Eurocrypt ’95, LNCS 921, pp.50–63, Springer-Verlag, 1995.
[FRI02] CBL – Cyberbanking & Law, issue 2, 2002.
[FRR03] Information Security Solutions Europe (ISSE), Vienna Austria, 2003.
[FUC00]Datenschutz und Datensicherheit, pp.514ff, 2000.
[FUC05] Fuchs, J., Podda, M., “Medical Genomics and Proteomics”, pp. 500-4, Marcel Dekker Inc., New York 2005. See http://www.benecke.com/dnacollection.pdf
[GEO01]GEO (7), pp.27-42, Hamburg, 2001.
[GMR88] Godwasser, Shafi, Micali, Silvio and Rivest, Ronald L.: “A Digital Signature Scheme Secure Against Chosen-Message Attacks”, SIAM Journal on Computing 17/2 pp.281-308, 1988.
[HES99] Hes, R., Hooghiemstra, T. F. M., Borking, J. J., “At face value: on
biometrical identification and privacy”, Registratiekamer, September 1999. See http://www.cbpweb.nl/en/documenten/EN_av_15_At_face_value.htm
[HVA04] Hvarre, J., “Electronic signatures in Denmark: free for all citizens”, e-signature and law journal, vol. 1, no1, 2004.
[IGA03] Igarza, J. J., Goirizelaia, I., Espinosa, K., Hernáez, I., Méndez, R., Sánchez, J., “Online Handwritten Signature Verification Using Hidden Markov Models”, Lecture Notes in Computer Science, pp.391-9, 2003.
[JAI04] Jain, A. K., Dass S. C., Nandakumar, K., “Can soft biometric traits assist user recognition?”, in Proceedings of SPIE Vol. 5404, Biometric Technology for Human Identification, pp.561-72, Orlando, FL, April 2004.
[JOB04] Jobling, M. A., Gill, P., “Encoded evidence: DNA in forensic analysis”, Nature (5), pp.739-52, 2004.
[KEN03] Kent, Stephen T. and Millett, Lynette I. (Eds.), “Who Goes There? Authentication Through the Lens of Privacy”, Committee on Authentication Technologies and Their Privacy Implications, National Research Council, ISBN 0309088968, 2003; see http://www.nap.edu/books/0309088968/html/
[KRA05]Rechtsmedizin, 2005.
[KOC99] Kocher, P., “Differential Power Analysis”, Crypto’99, LNCS 1666, pp.388-97, 1999.
[LAN02]
[LEE02] Lee, Byoungcheon and Kim, Kwangjo , “Self-Certified Signature”, Proc. of INDOCRYPT 2002, LNCS 2551, pp.199-214, Springer Verlag 2002.
[LIB05] Study “Biometrics at the Frontiers: Assessing the Impact on Society” Institute for Prospective Technological Studies (IPTS), Seville 2005. See http://cybersecurity.jrc.es/docs/LIBE%20Biometrics%20March%2005/Biometrics_exec_summ_EN.pdf
[LU04] Lu, X., Jain, A. K., “Ethnicity identification in Face Images”, Proc. SPIE, vol. 5404, pp.114-23, 2004.
[MAT02] Proc. of SPIE, Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pp. 275-89, 2002.
[MID03] Midgley, G., “Science as Systemic Intervention: Some Implications of Systems Thinking and Complexity for the Philosophy of Science”, Systemic Practice and Action Research, 16 (2), 2003.
[MON99] Monrose, F., Reiter, M. K., Wetzel, S., “Password hardening based on keystroke dynamics”, 6th ACM conf. Computer and Communications Security, pp. 73-82, 1999.
[MUN05] 13th European Conference on Information Systems (ECIS 2005), Regensburg, 2005.
[NAL03] Nalla, Divya and Reddy, K.C., "Signcryption scheme for Identity-based Cryptosystems", Cryptology ePrint Archive: Report 2003/044.
[PET97] Petersen, Holger and Horster, Patrick, “Self certified keys - Concepts and Applications”, Proc. 3rd Communications and Multimedia Security CMS’97, pp.102-116, Chapman and Hall, 1997.
[PFIT96] Pfitzmann, Birgit: “Digital Signature Schemes – General Framework and Fail-Stop Signatures”, Lectures on Computer Sciences Volume 1100, Springer-Verlag, 1996.
[PUT00] Proc. IFIP TC8/WG8.8, Fourth Working Conf. Smart Card Research and Adv. App., pp.289-303, 2000.
[RAI04] Raisch, P., Speech on biometrics at the workshop “Markt der biometrischen Möglichkeiten”, 12th of October 2004.
[RAN03] Datenschutz und Datensicherheit 27, pp.95-100, 2003.
[RAN04] Information Security Technical Report, vol. 9, No. 1, pp.77-85, 2004.
[ROG03] Rogers, E. M., “Diffusion of Innovation”, Fifth Edition, Free Press, 2003.
[ROG03b] Editorial in Multimedia und Recht, Issue 1, 2003.
[ROS04] Public Key Infrastructures, Berlin Heidelberg: Springer, pp.274-86, 2004.
[ROS05] Investing in Security Solutions - Can Qualified Electronic Signatures be Profitable for Mobile Operators”, 11th Americas Conference on Information Systems, Omaha, Nebraska, 2005.
[SAN04] Santos, C., Justino, E. J. R., Bortolozzi, F., Sabourin, R., “An Off-Line Signature Verification Method based on the Questioned Document Expert’s Approach and a Neural Network Classifier”, 9th Int. Workshop on Frontiers in Handwriting Recognition, pp.498-502, 2004.
[SCH00]Computer Security Journal, vol. 16 no. 1, pp.1-7, 2000. See http://www.schneier.com/paper-pki.pdf
[SCH99] Comm. ACM, vol. 42, no. 8, pp.136, Aug. 1999.
[SOK03]eine Herausforderung an den Datenschutz, pp.27-8, Düsseldorf, 2003. See http://www.ldi.nrw.de/pressestelle/presse_7_7.htm
[TSE03] Tseng, S. “Comparison of holistic and feature-based approaches to face recognition”, MBS Thesis, 2003. See http://goanna.cs.rmit.edu.au/~ronvs/teaching/theses/Tseng03.html
[TUR91] Turk, M., and Pentland, A. “Eigenfaces for recognition”, Journal of Cognitive Neuro Science 3, pp.71-86, 1991.
[ULU04] Uludag, U. and Jain, A. K. “Attacks on biometric systems: a case study in fingerprints”, Proc. SPIE-EI 2004, pp.622-33, San Jose, CA, January 18-22, 2004.
[WHI99] 9th USENIX Security Symposium, 1999.
[ZEH97] Zheng, Yuliang, "Signcryption and Its Applications in Efficient Public Key Solutions", In: Proc. of First International Workshop on Information Security, ISW ‘97, LNCS 1396, pp.291-312, Springer-Verlag 1998.
Denis Royer | 36 / 40 |