Enhancing Airport Access Control Security with Multiple Biometrics Contactless Smart Card (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
スポンサーリンク
概要
- 論文の詳細を見る
This paper looks at the issues facing biometrics technologies and smart cards. It then discusses ways to overcome these issues. The proposal is to use of multiple biometric features in contactless smart cards (CSC). The paper describes a sample generic airport access control security system. It recommends biometric features like the user's fingerprint, face or iris to provide authentication of the person presenting the card for access to a facility, or use of an application. The paper also suggests possible use of device features like uniquely identifiable semiconductor chips in combination with biometric features and personal data to enhance security for logical access in the future.
- 2003-08-15
著者
-
Sakurai Kouichi
Faculty Of Computer Science And Communication Engineering Kyushu University
-
David Michael
Cubic Corporation
-
Sakurai Kouichi
Faculty of Information Science and Electrical Engineering, Kyushu University
関連論文
- A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment(Application)(Cryptography and Information Security)
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider(Network Security)
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- A-7-21 Security Policy Pre-evaluation towards Risk Analysis
- Securing Provenance by Distributing the Provenance Storage
- Securing provenance by distributing the provenance storage (マルチメディア通信と分散処理・コンピュータセキュリティ)
- Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystems(Special Section on Cryptography and Information Security)
- PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis(Symmetric Key Cryptography)(Cryptography and Information Security)
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- A Simple Power Attack on a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems
- Analysis and Design of SHA-V and RIPEMD-V with Variable Output-Length
- Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems(Side Channel Analysis, Cryptography and Information Security)
- Trends and Security Issues for Contactless Smart Cards
- Enhancing Airport Access Control Security with Multiple Biometrics Contactless Smart Card (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider