ePassport security under the microscope

作者: Matthew Sirotich

DOI:

关键词:

摘要: This paper focuses on ePassport security which utilizes RFID chip technology. ePassports are increasingly being used by governments to enhance the border entry and exit process. The briefly describes nature of technology its characteristics pertaining different aspects security. approach taken in this study is two-fold: experimental first instance, followed a proof concept (POC). uses metrics draw conclusions security, safety privacy viability ePassport. Conclusions drawn from work inform (POC) provides one possible solution eradicate current issues related existing implementation. proposed system then compared using defined determine end user with most basic premise for that if new instituted increase state it should not be plagued problems would only national concerns.

参考文章(13)
Rajiv Khanna, Systems Engineering for Large-Scale Fingerprint Systems Automatic Fingerprint Recognition Systems. pp. 283- 304 ,(2004) , 10.1007/0-387-21685-5_14
Peter Thorsteinson, Arun Ganesh, Net Security and Cryptography ,(2003)
Automatic Fingerprint Recognition Systems Springer Publishing Company, Incorporated. ,(2011) , 10.1007/B97425
Yvo Desmedt, Man-in-the-Middle Attack. In: Tilborg, HCAV and Jajodia, S, (eds.) Encyclopedia of Cryptography and Security (2nd Ed.). (p. 759). Springer (2011). pp. 759- ,(2005)
Thorsten Staake, Frédéric Thiesse, Elgar Fleisch, Extending the EPC network Proceedings of the 2005 ACM symposium on Applied computing - SAC '05. pp. 1607- 1612 ,(2005) , 10.1145/1066677.1067041
Gregory T. Buehrer, Bruce W. Weide, Paolo A. G. Sivilotti, Using parse tree validation to prevent SQL injection attacks Proceedings of the 5th international workshop on Software engineering and middleware - SEM '05. pp. 106- 113 ,(2005) , 10.1145/1108473.1108496
Ari Juels, John Brainard, Soft blocking: flexible blocker tags on the cheap workshop on privacy in the electronic society. pp. 1- 7 ,(2004) , 10.1145/1029179.1029181
Ari Juels, Ronald L. Rivest, Michael Szydlo, The blocker tag: selective blocking of RFID tags for consumer privacy computer and communications security. pp. 103- 111 ,(2003) , 10.1145/948109.948126
R. Want, Enabling ubiquitous sensing with RFID IEEE Computer. ,vol. 37, pp. 84- 86 ,(2004) , 10.1109/MC.2004.1297315