Modelling and Simulation of a Biometric Identity-Based Cryptography
Journal Title: International Journal of Advanced Research in Artificial Intelligence(IJARAI) - Year 2014, Vol 3, Issue 10
Abstract
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tends to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. This paper also demonstrates the feasibility of using finite-state machines as a formal method to analyse the proposed protocols. Finally we showed how Petri Nets could be used to simulate the communication patterns between the server and client as well as to validate the protocol functionality.
Authors and Affiliations
Dania Aljeaid, Xiaoqi Ma, Caroline Langensiepen
External analysis of strategic market management can be realized based upon different human mindset–A debate in the light of statistical perspective
The paper entails the statistical correlation of the investigations carried out for the sales and profit prediction and analysis by persons of different mindsets in case of strategic uncertainty . The paper by vir...
Weapon Target Assignment with Combinatorial Optimization Techniques
Weapon Target Assignment (WTA) is the assignment of friendly weapons to the hostile targets in order to protect friendly assets or destroy the hostile targets and considered as a NP-complete problem. Thus, it is very har...
The Solution of Machines’ Time Scheduling Problem Using Artificial Intelligence Approaches
The solution of the Machines’ Time Scheduling Problem (MTSP) is a hot point of research that is not yet matured, and needs further work. This paper presents two algorithms for the solution of the Machines’ Time Sch...
Improving Performance Analysis Of Routing Efficiency In Wireless Sensor Networks Using Greedy Algorithm
The void problem causing the routing failure is the main challenge of the greedy routing in the wireless sensor networks. The current research work still can not fully deal with the void problem since the excessive...
A More Intelligent Literature Search
Although the topic of study relates to an environmental/health issue, it is the methodology described which serves to showcase an embryonic form of a new “more intelligent” protocol of search algorithm. Through the...