Bogari et al., 2012 - Google Patents
An investigative analysis of the security weaknesses in the evolution of RFID enabled passportBogari et al., 2012
View PDF- Document ID
- 4873846880877756931
- Author
- Bogari E
- Zavarsky P
- Lindskog D
- Ruhl R
- Publication year
- Publication venue
- International Journal of Internet Technology and Secured Transactions
External Links
Snippet
Since the introduction of radio frequency identification (RFID) enabled passports, the system has been plagued with various vulnerability issues that prove to compromise the e-passport security. To date, three generations of e-passports have been introduced by the International …
- 238000004458 analytical method 0 title description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10154021B1 (en) | Securitization of temporal digital communications with authentication and validation of user and access devices | |
Madhusudhan et al. | Dynamic ID-based remote user password authentication schemes using smart cards: A review | |
Bogari et al. | An investigative analysis of the security weaknesses in the evolution of RFID enabled passport | |
Liu et al. | A secure data backup scheme using multi‐factor authentication | |
Houy et al. | Security aspects of cryptocurrency wallets—a systematic literature review | |
Wang et al. | Secure password-based remote user authentication scheme with non-tamper resistant smart cards | |
Kumar | A New Secure Remote User Authentication Scheme with Smart Cards. | |
Yin et al. | Protecting private data by honey encryption | |
Kushwaha et al. | A brief survey of challenge–response authentication mechanisms | |
Praveen Kumar et al. | A password less authentication protocol for multi-server environment using physical unclonable function | |
Nithyanand | A Survey on the Evolution of Cryptographic Protocols in ePassports | |
Radanliev | Cyber-attacks on Public Key Cryptography | |
Eldefrawy et al. | Banknote Validation through an Embedded RFID Chip and an NFC‐Enabled Smartphone | |
Jensen et al. | A secure credit card protocol over NFC | |
Karger | Privacy and security threat analysis of the federal employee personal identity verification (PIV) program | |
Zhang et al. | An anti-counterfeiting RFID privacy protection protocol | |
Sinha | A survey of system security in contactless electronic passports | |
Kc et al. | Preventing attacks on machine readable travel documents (MRTDs) | |
Weiner et al. | Security analysis of a widely deployed locking system | |
Chaabouni et al. | The extended access control for machine readable travel documents | |
Hakami et al. | Secure Transaction Framework based on Encrypted One-time Password and Multi-factor | |
Sood | Phishing Attacks: A Challenge Ahead | |
Mishra et al. | Cryptanalysis and Improvement of Jiang et al.'s Smart Card Based Remote User Authentication Scheme | |
Prakash et al. | A generic framework to enhance two-factor authentication in cryptographic smart-card applications | |
Hussain et al. | SECURE BIO-RFID SYSTEM IN ORGANIZATIONS |