2014 Science and Information Conference 2014
DOI: 10.1109/sai.2014.6918245
|View full text |Cite
|
Sign up to set email alerts
|

Biometric identity-based cryptography for e-Government environment

Abstract: Abstract-Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The propo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
2

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 28 publications
0
8
0
2
Order By: Relevance
“…At this stage, we will test different attacks, such as impersonation attack, man-in-the-middle attack, and replay attack against the modified protocol and verify the security requirements. After analysis with PN, we will do a comparison between the previous protocol [5] and the modified version of it.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…At this stage, we will test different attacks, such as impersonation attack, man-in-the-middle attack, and replay attack against the modified protocol and verify the security requirements. After analysis with PN, we will do a comparison between the previous protocol [5] and the modified version of it.…”
Section: Discussionmentioning
confidence: 99%
“…In our previous work [5], we have developed a new authentication protocol that allows remote mutual authentication with key agreement. Our new protocol is based on biometric verification and ID-based Cryptograph.…”
Section: B Review Of Proposed Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…In our previous work [12], we have developed a new authentication protocol that allows remote mutual authentication with key agreement. Our new protocol is based on biometric verification and ID-based Cryptograph [13].…”
Section: B Review Of Proposed Protoclmentioning
confidence: 99%
“…As a highly efficient parallel search algorithm with few controlled parameters, the DE algorithm has been widely used in neuron networks [3,4], power systems [5,6], vehicle routing problems [7][8][9][10][11] and many other fields [12][13][14][15][16][17][18][19][20]. Like other intelligent algorithms, however, the DE algorithm also has disadvantages such as precocity, strong parameter dependence and difficulty in obtaining global optimum values for high-dimensional complex objective functions [21][22][23][24][25][26][27]. Therefore, researchers proposed a number of improvement strategies for DE's existing shortcomings.…”
Section: Introductionmentioning
confidence: 99%