Implementation of fast RSA key generation on smart cards
Proceedings of the 2002 ACM symposium on Applied computing
Silicon physical random functions
Proceedings of the 9th ACM conference on Computer and communications security
LFSR-based Hashing and Authentication
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Security and Privacy Issues in E-passports
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Physical unclonable functions for device authentication and secret key generation
Proceedings of the 44th annual Design Automation Conference
Design of a secure distance-bounding channel for RFID
Journal of Network and Computer Applications
RFID-Tags for anti-counterfeiting
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Hi-index | 0.00 |
Much of today's security for financial assets, services, facilities, personal information, immigration, employment and travel is provided in the form of a variety of ID instruments such as passports, credit cards, ID badges, access cards, and other similar forms of identification. Staggering costs associated with rampant identity theft are driving ongoing efforts to produce stronger, positive-ID documents and cards through the application of a wide variety of security enhancing techniques such as biometrics, embedded chips, encryption and specialized materials with security features. Each new generation of ID documents and cards becomes more technologically sophisticated and difficult to forge, forcing criminals to resort to increasingly complex and sophisticated forms of attack to circumvent their security mechanisms. Against this backdrop, ID Enrollment systems become particularly enticing targets for theft and unauthorized use, because with their use of authentic security materials, algorithms and production mechanisms, these systems are capable of producing truly undetectable fraudulent ID instruments capable of passing any and all security tests performed by even the most sophisticated ID verification terminals. This paper proposes and presents a practical location-based security framework designed to protect against any attempt to operate an ID production/enrollment system away from its authorized operating location.