Idology and Its Applications in Public Security and Network Security

被引:1
|
作者
Su, Shenghui [1 ,3 ]
Zheng, Jianhua [2 ]
Lu, Shuwang [2 ,5 ]
Huang, Zhiqiu [3 ]
Li, Zhoujun [4 ]
Tang, Zhenmin [1 ]
机构
[1] Nanjing Univ Sci & Technol, Secur Innovat Ctr, Nanjing 210094, Jiangsu, Peoples R China
[2] Univ Chinese Acad Sci, Lab Informat Secur, Beijing 100039, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Comp, Nanjing 211106, Jiangsu, Peoples R China
[4] Beihang Univ, Sch Comp, Beijing 100191, Peoples R China
[5] BFID Corp, Lab Computat Complex, Beijing 100098, Peoples R China
来源
INTELLIGENCE AND SECURITY INFORMATICS (PAISI 2017) | 2017年 / 10241卷
关键词
Idology; Symmetric identity; Asymmetric identity; Identification; Anti-fraud; Digital signature; Hash function; United verification platform; KEY CRYPTOSYSTEM; ANTI-FORGERY; SIGNATURES;
D O I
10.1007/978-3-319-57463-9_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fraud (swindling money, property, or authority by fictionizing, counterfeiting, forging, or imitating things, or by feigning persons privately) forms its threats against public security and network security. Anti-fraud is essentially the identification of a person or thing. In this paper, the authors first propose the concept of idology - a systematic and scientific study of identifications of persons and things, and give the definitions of a symmetric identity and an asymmetric identity. Discuss the converting symmetric identities (e.g., fingerprints) to asymmetric identities. Make a comparison between a symmetric identity and an asymmetric identity, and emphasize that symmetric identities cannot guard against inside jobs. Compare asymmetric RFIDs with BFIDs, and point out that a BFID is lightweight, economical, convenient, and environmentalistic, and more suitable for the anti-counterfeit and source tracing of consumable merchandise such as food, drugs, and cosmetics. The authors design the structure of a united verification platform for BFIDs and the composition of an identification system, and discuss the wide applications of BFIDs in public security and network security - antiterrorism and dynamic passwords for example.
引用
收藏
页码:129 / 149
页数:21
相关论文
共 50 条
  • [31] THE HUMAN IRIS STRUCTURE AND ITS APPLICATION IN SECURITY SYSTEM OF CAR
    Sreekala, P.
    Jose, Victor
    Joseph, James
    Joseph, Shibin
    2012 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING EDUCATION: INNOVATIVE PRACTICES AND FUTURE TRENDS (AICERA), 2012,
  • [32] Stream Cipher-Based Hash Function and Its Security
    Nakano, Yuto
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    E-BUSINESS AND TELECOMMUNICATIONS, 2012, 222 : 188 - 202
  • [33] Synoptic Approach on Biometric Modelling and its Application on Security Purposes
    Akshaya, Sabari, V
    Saratha, S.
    Devi, Subathra R.
    Ramya, S. K.
    Mohanapriya, A.
    2017 IEEE INTERNATIONAL CONFERENCE ON INNOVATIONS IN GREEN ENERGY AND HEALTHCARE TECHNOLOGIES (IGEHT), 2017,
  • [34] Forensic and security applications of a long-wavelength dispersive Raman system
    Ali, Esam M. A.
    Edwards, Howell G. M.
    Cox, Rick
    JOURNAL OF RAMAN SPECTROSCOPY, 2015, 46 (03) : 322 - 326
  • [35] A key transport protocol based on secret sharing applications to information security
    Eskicioglu, AM
    Delp, EJ
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2002, 48 (04) : 816 - 824
  • [36] Integrating Fuzzy Graph Theory into Cryptography: A Survey of Techniques and Security Applications
    Singh, Rashmi
    Khalid, Saifullah
    Nishad, D. K.
    Ruchira
    NEW MATHEMATICS AND NATURAL COMPUTATION, 2024,
  • [37] Photonics Engineering: Snapshot Applications in Healthcare, Homeland Security, Agriculture, and Industry
    Sumriddetchkajorn, Sarun
    INTERNATIONAL SEMINAR ON PHOTONICS, OPTICS, AND ITS APPLICATIONS (ISPHOA 2014), 2015, 9444
  • [38] Analysis on Security and Privacy Guidelines: RFID-Based IoT Applications
    Abdulghani, Hezam Akram
    Nijdam, Niels Alexander
    Konstantas, Dimitri
    IEEE ACCESS, 2022, 10 : 131528 - 131554
  • [39] Identity and Security
    Bellovin, Steven M.
    IEEE SECURITY & PRIVACY, 2010, 8 (02) : 88 - 88
  • [40] INFORMATION TECHNOLOGY - SECURITY TECHNIQUES AND STANDARDIZATION
    KRAUSE, L
    COMPUTER STANDARDS & INTERFACES, 1995, 17 (01) : 63 - 67