Modelling and Simulation of a Biometric Identity-Based Cryptography
Journal Title: International Journal of Advanced Research in Artificial Intelligence(IJARAI) - Year 2014, Vol 3, Issue 10
Abstract
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tends to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. This paper also demonstrates the feasibility of using finite-state machines as a formal method to analyse the proposed protocols. Finally we showed how Petri Nets could be used to simulate the communication patterns between the server and client as well as to validate the protocol functionality.
Authors and Affiliations
Dania Aljeaid, Xiaoqi Ma, Caroline Langensiepen
Thresholding Based Method for Rainy Cloud Detection with NOAA/AVHRR Data by Means of Jacobi Itteration Method
Thresholding based method for rainy cloud detection with NOAA/AVHRR data by means of Jacobi iteration method is proposed. Attempts of the proposed method are made through comparisons to truth data which are provide...
A Novel Approach for Discovery Quantitative Fuzzy Multi-Level Association Rules Mining Using Genetic Algorithm
Quantitative multilevel association rules mining is a central field to realize motivating associations among data components with multiple levels abstractions. The problem of expanding procedures to handle quantita...
Access Fee Charging System for Information Contents Sharing Through P2P Communications
Charge system for information contents exchange through P2P communications is proposed. Security is the most important for this charge system and is kept with data hiding method with steganography and watermarking. Secur...
A Design of a Multi-Agent Smart E-Examiner
this paper proposes a design of an application of multi agent technology on a semantic net knowledge base, to build a smart e-examiner system. This e-examiner could be used in building and grading a personalized sp...
Trend Analysis of Relatively Large Diatoms Which Appear in the Intensive Study Area of the Ariake Sea, Japan in Winter (2011-2015) based on Remote Sensing Satellite Data
Behavior of relatively large size of diatoms which appear in the Ariake Sea areas, Japan in winter based on remote sensing satellite data is clarified. Through experiments with Terra and AQUA MODIS data derived chl...