Are you the publisher? Claim or contact us about this channel

Embed this content in your HTML


Report adult content:

click to rate:

Account: (login)

More Channels


Channel Catalog

    0 0
  • 11/07/19--00:08: PDA-based signature device
  • PDA-based signature device Kollmann, Franz; Schartner, Peter Brömme, Arslan; Busch, Christoph Die Bereitstellung einer sicheren Umgebung zur Signaturerstellung stellt ein zentrales Problem beim praktischen Einsatz von digitalen Signaturen dar. Betrachtet man einen durchschnittlichen PC, oder gar einen öffentlich zugänglichen PC, so kann man nicht davon ausgehen, dass er unter alleiniger Kontrolle des Benutzers (des Signaturerstellers) ist. Die Sicherheit der Signaturumgebung lässt sich steigern, wenn man einen Personal Digital Assistant (PDA), als Signaturdevice verwendet. Um die sicherheitskritischen Daten (Signaturschlüssel) und Funktionen (Signaturfunktion) best- möglich zu schützen, werden diese Daten und Funktionen auf eine Chipkarte ausgelagert. Dieser Beitrag präsentiert zuerst die Synergieeffekte der gemeinsamen Nutzung von PDAs und Chipkarten. Danach folgt eine Beschreibung des entwickelten Prototyps, des sogenannten „PDA-based Signature Device“, und ein Ausblick auf Erweiterungsmöglichkeiten und geplante Forschungsvorhaben.

    0 0

    Authentication framework for smart cards Vassilev, Apostol; Hutchinson, Michael Brömme, Arslan; Busch, Christoph This paper introduces a generalized authentication framework for smart cards. The framework abstracts the authentication services on the card and allows flexible configuration of authentication policies and technologies. This paper also makes recommendations for extensions to current authentication APIs.

    0 0

    Pass phrase based speaker recognition for authentication Hertlein, Heinz; Frischholz, Robert; Nöth, Elmar Brömme, Arslan; Busch, Christoph Speaker recognition in applications of our daily lives is not yet in widespread use. In order for biometric technology to make sense for real-world authentication applications and be accepted by end users, convenience of use, robustness and accuracy of such a system are equally important. This paper defines these requirements for pass phrase based voice authentication embedded within a multi modal biometric system and describes methods and algorithms developed and optimized for the demands of such an application. Classification is based on dynamic time warping which can cope with limited training data. MFCC features which have been optimized for speaker specific properties are used. Robustness of the system is increased with speech enhancement and cepstral mean subtraction. Furthermore, vector quantization with speaker specific codebooks is applied in order to decrease storage requirements for the biometric template. On an appropriate data base, a verification EER of 2.7% is achieved with limited training and test material.

    0 0

    Multifactor biometric sketch authentication Brömme, Arslan; Al-Zubi, Stephan Brömme, Arslan; Busch, Christoph In this paper we propose a multifactor biometric sketch authentication method based on biometric sketch recognition and a user's personal knowledge about the sketch`s content, which is negotiated between the biometric authentication system and the user during enrollment. The used sketch recognition algorithm is based on the active shape structural model (ASSM) for analyzing the structural variability of sketches built up from a set of deformable shapes. For increasing the reliability of the biometric sketch authentication method the user's knowledge as authentication factor has been added by fulfilling specific sketching tasks of varying complexity given by the authentication system. An evaluation and testing framework for biometric algorithms was used to prove the accuracy of the method. For this purpose the biometric sketch algorithm has been adapted to the framework, a compiled sample database for comparability testing between users has been generated, and attack classes ranging from none, over partial to complete knowledge about the user's sketch has been developed and used. The evaluation of the test results shows that particularly the user's knowledge as an added authentication factor leads the used sketch recognition algorithm to high accuracy.