Clone Match Rate Evaluation for an Artifact-metric System (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
スポンサーリンク
概要
- 論文の詳細を見る
We have examined magnetic artifact-metric systems, which authenticate an artifact by verifying intrinsic patterns from magnetic texture randomly created on it. Also, we have illustrated how to efficiently evaluate the accuracy of authentication for a magnetic artifact-metric system. In this paper we produce clones using a magnetic material in accordance with acquired signals from the magnetic texture on a genuine artifact, and then measure the acceptance rates of them for the magnetic artifact-metric system. Based on our experimental results, we reveal that the clone match rates (CMRs) do not always depend on the original false match rates (FMRs). Therefore, we should evaluate the CMRs of the system using possible clones when we examine security of artifact-metric systems.
- 一般社団法人情報処理学会の論文
- 2003-08-15
著者
-
MATSUMOTO Hiroyuki
Information Storage Products Division, Nikon Corporation
-
Matsumoto T
Yokohama National Univ. Yokohama‐shi Jpn
-
Matsumoto Tsutomu
Graduate School Of Engineering Yokohama National University:graduate School Of Environment And Infor
-
Matsumoto H
Information Security Systems Division Nhk Spring Co. Ltd.
-
Matsumoto Hiroyuki
Information & Security Systems Division Nhk Spring Co. Ltd.:graduate School Of Engineering Yokoh
-
松本 勉
Graduate School of Environment and Information Sciences, Yokohama National University
関連論文
- Shared Pseudo-Random Secret Generation Protocols (Special Section on Discrete Mathematics and Its Applications)
- Efficient and Secure Multiparty Generation of Digital Signatures Based on Discrete Logarithms (Special Section on Discrete Mathematics and Its Applications)
- Unconditionally Secure Group Signatures
- Recording Power Characteristics of 130mm Overwritable MO Disk by Laser Power Modulation Method
- Direct Overwrite by Light Power Modulation on Magneto-Optical Multi-Layered Media : DRIVE TECHNIQUE
- C/N Improvement of Direct Overwrite Magneto-Optical Disk by Adding a GdFeCo Readout Layer : Media
- Interaction Key Generation Schemes (Protocol) (Cryptography and Information Security)
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- A Distributed User Revocation Scheme for Ad-Hoc Networks(Advances in Ad Hoc Mobile Communications and Networking)
- How to Maximize the Potential of FPGA-Based DSPs for Modular Exponentiation
- A Design Methodology for a DPA-Resistant Circuit with RSL Techniques
- How to Decide Selection Functions for Power Analysis : From the Viewpoint of Hardware Architecture of Block Ciphers
- On Collusion Security of Random Codes(Biometrics)(Cryptography and Information Security)
- Collusion Secure Codes : Systematic Security Definitions and Their Relations(Discrete Mathematics and Its Applications)
- Clone Match Rate Evaluation for an Artifact-metric System (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- Evaluation of Dynamic Fracture Toughness of Unidirectional CFRP Laminates
- Boundary Element Analysis for Unsteady Elastodynamic Problems Based on the Laplace Transform
- Measurement of Anisotropic Elastic Moduli in Local Area by Acoustic Microscope : The Case of Cubic Single Crystal
- Elastodynamic Thin Plate Bending Analysis by Boundary Element Method with Laplace Transform
- Effects of Couplers on Acoustic Velocity Measurement by Complex V(z) Method
- Detection-Resistant Steganography for Standard MIDI Files (Information Security)
- An Evaluation Method of Time Stamping Schemes from Viewpoints of Integrity, Cost and Availability(Special Section on Cryptography and Information Security)
- An Artifact-metric System Which Utilizes Inherent Texture (特集 21世紀のコンピュータセキュリティ技術)
- Random-Error-Resilient Tracing Algorithm for a Collusion-Secure Fingerprinting Code (特集 電子社会に向けたコンピュータセキュリティ技術)
- A Flexible Tree-Based Key Management Framework(Special Section on Cryptography and Information Security)
- Information-Flow-Based Access Control for Web Browsers
- Multiparty DSA Signature Generation without Simultaneous User Operations(Application Information Security)
- Random-Error Resilience of a Short Collusion-Secure Code
- An Evaluation Method for a Magnetic Artifact-metric System (特集 電子社会に向けたコンピュータセキュリティ技術)
- A Scheme of Secret Communication Using Internet Control Message Protocol(Special Section on Cryptography and Information Security)
- An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation
- On Applicability of Differential Cryptanalysis, Linear Cryptanalysis and Mod n Cryptanalysis to an Encryption Algorithm M8(ISO9979-20) (特集 21世紀のコンピュータセキュリティ技術)
- A proper security analysis method for CMOS cryptographic circuits
- Finding Malicious Authoritative DNS Servers