You are here: Resources > FIDIS Deliverables > HighTechID > D3.2: A study on PKI and biometrics > 

D3.2: A study on PKI and biometrics

Conclusion  Title:
REFERENCES
 Acronyms and Glossary

 

References

 

[ALT03]    Alternman, A., “A piece of yourself: ethical issues in biometric identification” Ethics and Information Technology, (5), pp.139-50, 2003.

[AMB03]Erlangen, 2003. See http://www.wi3.uni-erlangen.de/forschung/Biometrie_StateOfTheArt/Biometrie.pdf

[ANG96]    Angell, I., “Economic Crime: Beyond Good and Evil”, Journal of Financial Regulation and Compliance, 4 (1), 1996.

[ANG00]    Angell, I., “The New Barbarian Manifesto: How to survive the Information Age”, London, Kogan, ISBN 0-7494-3151-2, 2000.

[ANG05]    Angell, I., Demetis, D., “Systems Thinking about Anti-Money Laundering: Considering the Greek Case”, Journal of Money Laundering Control, 8 (3), 2005.

[ASW98]     Asokan, N., Shoup, Victor, Waidner, Michael, “Optimistic Fair Exchange of Digital Signatures”; In: Proceedings of , pp.591–606, Springer-Verlag, 1998.

[BÄU99]

[BEL99]    Bellare, Mihir and Miner, Sara, "A forward-secure digital signature scheme", In: Proceedings of Crypto’99, LNCS 1666, Springer-Verlag, 1999.

[BEN01]

[BEN02]    Benecke, M., “Coding or non-coding, that is he question”, EMBO reports vol. 3 no. 6, 2002. See http://www.benecke.com/coding.pdf

[BSI03]    Study „BioFace I and II“,German Federal Office for Information Security, Darmstadt 2003.     
See http://www.bsi.de/english/publications/BioFace/BioFaceIIReport.pdf

[BSI04]German Federal Office for Information Security, Darmstadt 2004. See http://www.bsi.de/literat/studien/BioFinger/BioFinger_I_I.pdf

[BYR01]    Byrd, J. H., Castner J. L., (ed), “The Utility of Arthropods in Legal Investigations”, pp.341-52, CRC Press, Boca Raton, 2001. See http://www.benecke.com/crc2.html

[CAP01]     Cap, C. H., Maibaum, N., Heyden, L., “Extending the Data Storage Capabilities of a Java-based Smartcard”, 6th IEEE Symposium on Computers and Communications, Hammamet, Tunesia 3-5 July, 2001.

[CHA90]Chaum, David, van Antwerpen, Hans, “Undeniable Signatures“, In: Proceedings of Crypto ´89, LNCS 435, pp.212-216, Springer-Verlag, Heidelberg, 1990.

[CHA95]    David Chaum, “Designated Confirmer Signatures”, In: Proceedings of Eurocrypt´95, LNCS 950, pp.86-91, Springer-Verlag, Berlin, 1995.

[CLA02]    Clarke, R., “Biometrics’ Inadequacies and Threats, and the Need for Regulation”, Presentation on the Computers, Freedom & Privacy 2002; see http://www.anu.edu.au/people/Roger.Clarke/DV/BiomThreats.html

[DAU04]    Daugman, J., “How Iris recognition works”, IEEE Trans. CSVT 14 (1), pp.21-30, 2004. See http://www.cl.cam.ac.uk/users/jgd1000/irisrecog.pdf

[DAV94]     Davies, S., “Touching Big Brother: How Biometric Technology will fuse Flesh and Machine”, Information Technology & People (), 4, pp.38-47, 1994.

[DAV02]    Davies, S., “A Year After 9/11: Where are we now?”, Communications of the ACM, 45(9), 2002.

[DEM04]    Demetis, D., “The World on Discount”, Journal of the London School of Economics, SU 3 (1), 2004.

[DER03] Pattern Recognition, vol. 36, pp.383-96, 2003.

[DHI96]Dhillon, G., Backhouse, J., “Risks in the use of information technology within organizations”, Int. J. Information Management, 16, 1, pp.65-74, 1996.

[DHI00]    Dhillon, G., Backhouse, J., “Information System Security Management in the New Millennium” Communications of the ACM, 43 (7) pp.125-8, 2000.

[FIA87]    Fiat, Amos and Shamir, Adi, “How to Prove Yourself: Practical Solutions to Identification and Signature Problems”, In: Proceedings of Crypto´86, LNCS 263, pp.186-194, Springer-Verlag, Berlin 1987.

[FR95]     Franklin, Matthew K. and Reiter, Michael K., “Verifiable Signature Sharing”; Eurocrypt ’95, LNCS 921, pp.50–63, Springer-Verlag, 1995.

[FRI02] CBL – Cyberbanking & Law, issue 2, 2002.

[FRR03] Information Security Solutions Europe (ISSE), Vienna Austria, 2003.

[FUC00]Datenschutz und Datensicherheit, pp.514ff, 2000.

[FUC05]    Fuchs, J., Podda, M., “Medical Genomics and Proteomics”, pp. 500-4, Marcel Dekker Inc., New York 2005. See http://www.benecke.com/dnacollection.pdf

[GEO01]GEO (7), pp.27-42, Hamburg, 2001.

[GMR88]    Godwasser, Shafi, Micali, Silvio and Rivest, Ronald L.: “A Digital Signature Scheme Secure Against Chosen-Message Attacks”, SIAM Journal on Computing 17/2 pp.281-308, 1988.

[HES99]    Hes, R., Hooghiemstra, T. F. M., Borking, J. J., “At face value: on
biometrical identification and privacy”, Registratiekamer, September 1999. See http://www.cbpweb.nl/en/documenten/EN_av_15_At_face_value.htm

[HVA04]     Hvarre, J., “Electronic signatures in Denmark: free for all citizens”, e-signature and law journal, vol. 1, no1, 2004.

[IGA03]     Igarza, J. J., Goirizelaia, I., Espinosa, K., Hernáez, I., Méndez, R., Sánchez, J., “Online Handwritten Signature Verification Using Hidden Markov Models”, Lecture Notes in Computer Science, pp.391-9, 2003.

[JAI04]     Jain, A. K., Dass S. C., Nandakumar, K., “Can soft biometric traits assist user recognition?”, in Proceedings of SPIE Vol. 5404, Biometric Technology for Human Identification, pp.561-72, Orlando, FL, April 2004.

[JOB04]    Jobling, M. A., Gill, P., “Encoded evidence: DNA in forensic analysis”, Nature (5), pp.739-52, 2004.

[KEN03]    Kent, Stephen T. and Millett, Lynette I. (Eds.), “Who Goes There? Authentication Through the Lens of Privacy”, Committee on Authentication Technologies and Their Privacy Implications, National Research Council, ISBN 0309088968, 2003; see http://www.nap.edu/books/0309088968/html/

[KRA05]Rechtsmedizin, 2005.

[KOC99]     Kocher, P., “Differential Power Analysis”, Crypto’99, LNCS 1666, pp.388-97, 1999.

[LAN02]

[LEE02]    Lee, Byoungcheon and Kim, Kwangjo , “Self-Certified Signature”, Proc. of INDOCRYPT 2002, LNCS 2551, pp.199-214, Springer Verlag 2002.

[LIB05]    Study “Biometrics at the Frontiers: Assessing the Impact on Society” Institute for Prospective Technological Studies (IPTS), Seville 2005. See http://cybersecurity.jrc.es/docs/LIBE%20Biometrics%20March%2005/Biometrics_exec_summ_EN.pdf

[LU04]     Lu, X., Jain, A. K., “Ethnicity identification in Face Images”, Proc. SPIE, vol. 5404, pp.114-23, 2004.

[MAT02] Proc. of SPIE, Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pp. 275-89, 2002.

[MID03]    Midgley, G., “Science as Systemic Intervention: Some Implications of Systems Thinking and Complexity for the Philosophy of Science”, Systemic Practice and Action Research, 16 (2), 2003.

[MON99]     Monrose, F., Reiter, M. K., Wetzel, S., “Password hardening based on keystroke dynamics”, 6th ACM conf. Computer and Communications Security, pp. 73-82, 1999.

[MUN05] 13th European Conference on Information Systems (ECIS 2005), Regensburg, 2005.

[NAL03]    Nalla, Divya and Reddy, K.C., "Signcryption scheme for Identity-based Cryptosystems", Cryptology ePrint Archive: Report 2003/044.

[PET97]    Petersen, Holger and Horster, Patrick, “Self certified keys - Concepts and Applications”,  Proc. 3rd Communications and Multimedia Security CMS’97, pp.102-116, Chapman and Hall, 1997.

[PFIT96]    Pfitzmann, Birgit: “Digital Signature Schemes – General Framework and Fail-Stop Signatures”, Lectures on Computer Sciences Volume 1100, Springer-Verlag, 1996.

[PUT00] Proc. IFIP TC8/WG8.8, Fourth Working Conf. Smart Card Research and Adv. App., pp.289-303, 2000.

[RAI04]    Raisch, P., Speech on biometrics at the workshop “Markt der biometrischen Möglichkeiten”, 12th of October 2004.

[RAN03] Datenschutz und Datensicherheit 27, pp.95-100, 2003.

[RAN04] Information Security Technical Report, vol. 9, No. 1, pp.77-85, 2004.

[ROG03]    Rogers, E. M., “Diffusion of Innovation”, Fifth Edition, Free Press, 2003.

[ROG03b] Editorial in Multimedia und Recht, Issue 1, 2003.

[ROS04] Public Key Infrastructures, Berlin Heidelberg: Springer, pp.274-86, 2004.

[ROS05] Investing in Security Solutions - Can Qualified Electronic Signatures be Profitable for Mobile Operators”, 11th Americas Conference on Information Systems, Omaha, Nebraska, 2005.

[SAN04]     Santos, C., Justino, E. J. R., Bortolozzi, F., Sabourin, R., “An Off-Line Signature Verification Method based on the Questioned Document Expert’s Approach and a Neural Network Classifier”, 9th Int. Workshop on Frontiers in Handwriting Recognition, pp.498-502, 2004.

[SCH00]Computer Security Journal, vol. 16 no. 1, pp.1-7, 2000. See http://www.schneier.com/paper-pki.pdf

[SCH99] Comm. ACM, vol. 42, no. 8, pp.136, Aug. 1999.

[SOK03]eine Herausforderung an den Datenschutz, pp.27-8, Düsseldorf, 2003. See http://www.ldi.nrw.de/pressestelle/presse_7_7.htm

[TSE03]     Tseng, S. “Comparison of holistic and feature-based approaches to face recognition”, MBS Thesis, 2003. See http://goanna.cs.rmit.edu.au/~ronvs/teaching/theses/Tseng03.html

[TUR91]     Turk, M., and Pentland, A. “Eigenfaces for recognition”, Journal of Cognitive Neuro Science 3, pp.71-86, 1991.

[ULU04]     Uludag, U. and Jain, A. K. “Attacks on biometric systems: a case study in fingerprints”, Proc. SPIE-EI 2004, pp.622-33, San Jose, CA, January 18-22, 2004.

[WHI99] 9th USENIX Security Symposium, 1999.

[ZEH97]    Zheng, Yuliang, "Signcryption and Its Applications in Efficient Public Key Solutions", In: Proc. of First International Workshop on Information Security, ISW ‘97, LNCS 1396, pp.291-312, Springer-Verlag 1998.

 

 

 

Conclusion  fidis-wp3-del3.2.study_on_PKI_and_biometrics_03.sxw  Acronyms and Glossary
Denis Royer 36 / 40