Security Role of Biometrics in Electronic Transactions

被引:0
|
作者
Tyagi, Anshuman [1 ]
Singh, Piyush Bhushan [1 ]
Yadav, Vikash Singh [2 ]
Singh, Sangharsh Kumar [2 ]
Tiwari, Amod [3 ]
机构
[1] Sai Nath Univ, Ranchi, Jharkhand, India
[2] CMJ Univ, Shillong, Meghalaya, India
[3] PSIT, Dept Comp Sci & Engn, Kanpur, Uttar Pradesh, India
来源
2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC) | 2012年
关键词
Biometric; finger prints; signature; voice;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As electronics transaction are increasing in day-by-day in common man's life therefore it is luring to people involve in unlawful activity to commit frauds in electronics tractions also. They understand the weakness of the system and exploit. Though may very effective Public-Private-Key based algorithms have be developed providing security for transmissions of electronic data still have room for leakage of key? If we use biometrics based encryption in electronic transmission then we can ensure most safe transmission of data, especially in commercial tractions. Let us understand the biometrics and area which must use it. In any application having electronic communication has some most common security requirements are Authentication, Privacy/confidentiality, Integrity and Non-repudiation. The Cryptography not only protects data from alteration or theft, but it can also be used for user authentication.
引用
收藏
页码:625 / 627
页数:3
相关论文
共 50 条
  • [41] Transactions and Electronic Commerce
    Schuldt, H
    Popovici, A
    TRANSACTIONS AND DATABASE DYNAMICS, 2000, 1773 : 225 - 230
  • [42] PERSONAL ELECTRONIC TRANSACTIONS
    YOB, G
    CREATIVE COMPUTING, 1983, 9 (02): : 290 - &
  • [43] Evaluating and selecting the biometrics in network security
    Liu, Che-Hung
    Wang, Jen-Sheng
    Peng, Chih-Chiang
    Shyu, Joseph Z.
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (05) : 727 - 739
  • [44] PERSONAL ELECTRONIC TRANSACTIONS
    YOB, G
    CREATIVE COMPUTING, 1982, 8 (08): : 236 - 241
  • [45] SECURITY OF BIOMETRICS USING MULTIMODAL APPROACH
    Ahmed, AbdulHaseeb
    Malik, Hafiz
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 130 - 135
  • [46] PROMISES AND CHALLENGES OF BIOMETRICS IN INFORMATION SECURITY
    HEIMBACH, PJ
    SCAT 89 : SMART CARD APPLICATIONS AND TECHNOLOGY / ASIT 89 : ADVANCED SECURITY AND IDENTIFICATION TECHNOLOGY: CONFERENCE PROCEEDINGS, 1989, : B27 - B36
  • [47] Computational biometrics, multimedia analysis, and security
    Yu, H
    IEEE MULTIMEDIA, 2003, 10 (02) : COVER2 - +
  • [48] Biometrics 2.0 for the Security of Smart Cities
    Jia, Wei
    Zhang, Zhecheng
    Zhao, Yang
    Min, Hai
    Li, Shujie
    MACHINE INTELLIGENCE RESEARCH, 2024, 21 (06) : 1121 - 1144
  • [49] PERSONAL ELECTRONIC TRANSACTIONS
    YOB, G
    CREATIVE COMPUTING, 1982, 8 (06): : 222 - 225
  • [50] Mobile phones security using biometrics
    Shabeer, H. Abdul
    Suganthi, P.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 270 - +