Search results

1 – 5 of 5
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 December 2001

P.K. Janbandhu and M.Y. Siyal

Personal identification numbers, passwords, smart cards and digital certificates are some of the means employed for user authentication in various electronic commerce…

1982

Abstract

Personal identification numbers, passwords, smart cards and digital certificates are some of the means employed for user authentication in various electronic commerce applications. However, these means do not really identify a person, but only knowledge of some data or belonging of some determined object. This paper introduces the notion of biometric signature – a new approach to integrate biometrics with public key infrastructure, using biometric based digital signature generation which is secure, efficacious, fast, convenient, non‐invasive and correctly identifies the maker of a transaction. It also suggests two schemes for biometric signature using two existing and widely used digital signature algorithms, RSA and DSA, and discusses the problems associated with them individually. Speed of both schemes (based on iris recognition) is measured and compared with the help of JAVA implementation for both approaches.

Details

Information Management & Computer Security, vol. 9 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 2002

M.Y. Siyal and B. Barkat

In this paper we present a framework for enhancing trust in Internet commerce. Experience shows that efficient cryptographic protocols are not enough to guarantee peoples’…

827

Abstract

In this paper we present a framework for enhancing trust in Internet commerce. Experience shows that efficient cryptographic protocols are not enough to guarantee peoples’ confidence in Internet commerce; the transacting parties must also trust each other. Hence, the main ingredient missing in today’s e‐commerce infrastructures is modeling and implementing trust. Several attempts have been made to provide secure and trusted protocols but few have seen any practical use. This paper shows how trust can be provided through a network of Trust Service Providers (TSp). We have identified a set of services that should be offered by a TSp. We also present a distributed object‐oriented implementation of trust services using CORBA, JAVA and XML.

Details

Internet Research, vol. 12 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Access Restricted. View access options
Article
Publication date: 13 July 2012

Weiguo Sheng, Gareth Howells, Michael Fairhurst, Farzin Deravi and Shengyong Chen

Biometric authentication, which requires storage of biometric templates and/or encryption keys, raises a matter of serious concern, since the compromise of templates or keys…

864

Abstract

Purpose

Biometric authentication, which requires storage of biometric templates and/or encryption keys, raises a matter of serious concern, since the compromise of templates or keys necessarily compromises the information secured by those keys. To address such concerns, efforts based on dynamic key generation directly from the biometrics have recently emerged. However, previous methods often have quite unacceptable authentication performance and/or small key spaces and therefore are not viable in practice. The purpose of this paper is to propose a novel method which can reliably generate long keys while requires storage of neither biometric templates nor encryption keys.

Design/methodology/approach

This proposition is achieved by devising the use of fingerprint orientation fields for key generation. Additionally, the keys produced are not permanently linked to the orientation fields, hence, allowing them to be replaced in the event of key compromise.

Findings

The evaluation demonstrates that the proposed method for dynamic key generation can offer both good reliability and security in practice, and outperforms other related methods.

Originality/value

In this paper, the authors propose a novel method which can reliably generate long keys while requires storage of neither biometric templates nor encryption keys. This is achieved by devising the use of fingerprint orientation fields for key generation. Additionally, the keys produced are not permanently linked to the orientation fields, hence, allowing them to be replaced in the event of key compromise.

Details

Information Management & Computer Security, vol. 20 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Case study
Publication date: 14 March 2016

Samir K. Barua and Sobhesh Kumar Agarwalla

The case describes the strategy of a large Indian Public Sector Bank (PSB) to enhance financial inclusion and financial literacy of less privileged people located in poorly…

Abstract

The case describes the strategy of a large Indian Public Sector Bank (PSB) to enhance financial inclusion and financial literacy of less privileged people located in poorly accessible parts of India. While pursuing the developmental objective ‘imposed’ by the Central Bank/government, being a listed entity, the PSB had to be mindful of the financial viability of the strategy so as to protect the interest of its minority shareholders. The issues covered are endemic to most developing countries where public enterprises often become instrumentality of the state.

Available. Open Access. Open Access
Article
Publication date: 13 April 2023

Salim Ahmed, Khushboo Kumari and Durgeshwer Singh

Petroleum hydrocarbons are naturally occurring flammable fossil fuels used as conventional energy sources. It has carcinogenic, mutagenic properties and is considered a hazardous…

3346

Abstract

Purpose

Petroleum hydrocarbons are naturally occurring flammable fossil fuels used as conventional energy sources. It has carcinogenic, mutagenic properties and is considered a hazardous pollutant. Soil contaminated with petroleum hydrocarbons adversely affects the properties of soil. This paper aim to remove pollutants from the environment is an urgent need of the hour to maintain the proper functioning of soil ecosystems.

Design/methodology/approach

The ability of micro-organisms to degrade petroleum hydrocarbons makes it possible to use these microorganisms to clean the environment from petroleum pollution. For preparing this review, research papers and review articles related to petroleum hydrocarbons degradation by micro-organisms were collected from journals and various search engines.

Findings

Various physical and chemical methods are used for remediation of petroleum hydrocarbons contaminants. However, these methods have several disadvantages. This paper will discuss a novel understanding of petroleum hydrocarbons degradation and how micro-organisms help in petroleum-contaminated soil restoration. Bioremediation is recognized as the most environment-friendly technique for remediation. The research studies demonstrated that bacterial consortium have high biodegradation rate of petroleum hydrocarbons ranging from 83% to 89%.

Social implications

Proper management of petroleum hydrocarbons pollutants from the environment is necessary because of their toxicity effects on human and environmental health.

Originality/value

This paper discussed novel mechanisms adopted by bacteria for biodegradation of petroleum hydrocarbons, aerobic and anaerobic biodegradation pathways, genes and enzymes involved in petroleum hydrocarbons biodegradation.

Details

Arab Gulf Journal of Scientific Research, vol. 42 no. 2
Type: Research Article
ISSN: 1985-9899

Keywords

1 – 5 of 5
Per page
102050