Keystroke dynamics as a biometric for authentication
Future Generation Computer Systems - Special issue on security on the Web
A Practical Secret Voting Scheme for Large Scale Elections
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Towards a Practical, Secure, and Very Large Scale Online Election
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Sensus: A Security-Conscious Electronic Polling System for the Internet
HICSS '97 Proceedings of the 30th Hawaii International Conference on System Sciences: Information System Track-Organizational Systems and Technology - Volume 3
Typing Patterns: A Key to User Identification
IEEE Security and Privacy
Hi-index | 0.00 |
Identification in electronic networks (e-Identification) has been a source of new risks in e-commerce and e-government [3, 22]. Identity theft is the fastest growing white-collar crime in many countries, specifically in developed countries. The identity theft (IDT) report presented by Competition Bureau Canada indicates that the cost of IDT to the economy of Canada has increased by 83% in the period of 2002-2003. Also, the average loss of victims has increased from 1439Cnd$ in 2002, to 1614Cnd$ in 2003. This increase can also be observed in other developed countries at the same level. This rapid increase of identity theft indicates that the development of optimal identification systems in organizations is far behind the development of electronic networks. One of the central issues in IDT is the identification process. Understanding the identification processes in electronic systems, its concepts, and tools are the fundamentals of designing, implementing and operating an efficient and effective identification system. However, there have been very few studies in this area, and there is a gap in literature specifically on identification tools, their characteristics, their efficiency and their effectiveness, and their usability. This paper presents a comprehensive model representing virtually all of the commonly used identifiers in electronic networks and their characteristics, and also presents measures of efficiency and effectiveness of identification tools in electronic networks.1