Digitale Ausweise für physische Identifikation?
|
|
- Steven Harris
- 6 years ago
- Views:
Transcription
1 Digitale Ausweise für physische Identifikation? Univ.-Prof. Dr. René Mayrhofer und Michael Hölzl, MSc Institut für Netzwerke und Sicherheit, Johannes Kepler Universität Linz Vortrag zur IKT-Sicherheitskonferenz :15, St. Johann im Pongau
2 Motivating Scenario: Convergence of Security-Critical Services 2
3 Digital Identity: State of the Art OpenID: some (large) providers, many (small) consumers Facebook Google... FIDO U2F UAF Österreichische Bürgerkarte all optimized for web page login, not physical identification 3
4 Motivating Scenario: Convergence of Security-Critical Services 4
5 Digital (Photo-) ID for Physical Identification Online solution: MIA (My Identity App) by Österreichische Staatsdruckerei App for smart phones for using virtual identity cards requires online connectivity for verifying these documents Current project in JRZ u smile: AmDL (Austrian mobile Driving License) with partners A1 Telekom Drei-Banken-EDV LG Nexera NXP Semiconductors Österreichische Staatsdruckerei SBA Research 5
6 AmDL Use Case 1: Identity Verification by Police All relevant attributes need to be presented, e.g. ID number: Name Date of birth Full-resolution photo (optional) Biometric identifiers Vehicle classes Restrictions/limitations Surname: EINSTEIN Givenname: Albert Date of Birth: Sex: M Place of Birth: Only accessible to officially Ulm, Germany certified readers GENUINE Citizenship: USA, Switzerland Offline ID attributes transfer Signature: and offline verification Should also work when mobile phone battery is empty! 6
7 AmDL Use Case 2: Age Verification Age verification by e.g. Automated vending machines Bouncers at clubs Entrance staff for birthday rebate promotions ID number: Surname: EINSTEIN Givenname: Only age attribute should be Albert transferred in privacysensitive manner Date of Birth: > 16 years Not the full date of birth! Support binary yes/no answers for specific use case Sex: M Place of Birth: Ulm, Germany GENUINE Citizenship: USA, Switzerland Signature: 7
8 AmDL Use Case 3: Time-based Ticket for Public Transport Typical for public transport Monthly Yearly (any time period) No identifiers should to be transferred (no name, date of birth, etc.) for privacy reasons Location traces are highly sensitive personal data Still need to support typical operations Unforgeability Revocation (loss, theft, non- payment, etc.) 8
9 Requirements Functional Mobility Real-world identification Offline One-to-many Power-off Revocation Scalability Security Privacy Key confidentiality Unlinkability Unforgeability User control Communication protection Privacy-preserving attribute State-of-the-art cryptography queries 9
10 Extensible and Privacy-preserving Mobile eid 10
11 Technologies NFC Secure Element (SE) Protect identity keys Integrity assurances Code isolation Group signatures Members can sign on behalf of the group Anonymity in the group Unlinkability 11
12 Privacy-preserving Identification ID number: ID number: Surname: Surname: EINSTEIN EINSTEIN Givenname: Givenname: Albert Date of Birth: Sex: M Place of Birth: Ulm, Germany Albert Date of Birth: > 16 years GENUINE Citizenship: Sex: M Place of Birth: Ulm, Germany GENUINE Citizenship: USA, Switzerland USA, Switzerland Signature: Signature: Group signature of national eid 12
13 Privacy-preserving Identification Privacy-preserving attribute queries Attribute inequality query ID number: E.g. above 16 years old? Surname: EINSTEIN Attribute equality query E.g. Austrian citizen? Givenname: Albert Group membership query E.g. enrolled to public transport system? E.g. allowed to drive this vehicle class (for renting a car)? Date of Birth: > 16 years Sex: M Place of Birth: Ulm, Germany GENUINE Citizenship: Austrian USA,==Switzerland Signature: 13
14 Group/Division Membership ID number: Surname: EINSTEIN Givenname: Albert Date of Birth: Sex: M Place of Birth: Ulm, Germany Citizenship: USA, Switzerland Signature: Extensibility of eid for the use with numerous groups/divisions e.g. loyalty card, public transport ticket, students card, etc. Challenge: unlinkability, untraceability 14
15 Group/Division Membership ID number: Surname: EINSTEIN Givenname: Approach Pseudonym concept of Austrian Bürgerkarte Each division has an identifier eid generates pseudonym for division id d Albert id u, d =H (id u id d ) derive Divisions can add data to eid Protected with TOFU database C=E(pk d, id u,d n D) where n is a random nonce and D are data attributes 15
16 Extensible and Privacy-preserving Mobile eid 16
17 Revocation Scenarios User lost her phone (the eid) Revocation done by user eid has been withdrawn (e.g. holder deceased) Done by central authorities Additional threat: identity theft 17
18 Revocation Usual approach: revocation list Problem: no ID in group signature Additional challenges: 1. Items on the revocation list might loose anonymity 2. Additional computation effort 3. Could weaken unlinkability 4. Growing revocation list 18
19 Preserving Privacy beyond Revocation New revocation concept based on Offline revocation token generation on SE Bloom filter Features of our approach Scalability through efficient revocation check (O(1)) Backwards unlinkability Verifier-local revocation check Offline verification 19
20 Preserving Privacy beyond Revocation Revocation list based on bloom filter Probabilistic data structure Provides scalability Revocation token difficult to restore {x, {y,x,z }y, z } w 20
21 Preserving Privacy beyond Revocation Revocation filter {x, y, z } Verifier Prover Random identifier id v and challenge ch Prover Verifier Generated revocation token rt i, v =H (id v H (id u, se gpk c i )) Validation of group membership σ= sign (gsk i, ch rt i,v )
22 Preserving Privacy beyond Revocation Computation times 22
23 Open Issue: Backup of Digital Identity 23
24 Next Step: Digital Identity in the Cloud Friends with Faces LIKE ME! Trust us, we have a Privacy Shield! 24
25 You can search for everybody And we have assistants Next Step: Digital Identity in the Cloud Data stored for future improvement of all our services 25
26 We are looking for interested partners: - technology - use cases - funding... Next Step: Digital Identity in the Cloud 1 [globally universal] [open market] certify identity PERSONAL AGENT TPM 5 digital service discovery, distributed network setup 7 VERIFIER Digital world 4 2 [locally different] 6 BIOMETRIC SENSOR TPM 3 provide unique ID 8 trigger reaction Physical world Sicherheit in der Digitalisierung 26
27 Danke für Ihre Aufmerksamkeit! Fragen? Univ.-Prof. Dr. René Mayrhofer Vorstand des Instituts für Netzwerke und Sicherheit Michael Hölzl, MSc Universitätsassistent JOHANNES KEPLER UNIVERSITÄT LINZ Altenberger Str Linz, Österreich
28 Credits Icons SIM Card by Arthur Shlain from the Noun Project People pattern by Eliricon from the Noun Project Agreement by Chameleon Design from the Noun Project Smart Phone by Emily Haasch from the Noun Project Airplane Ticket by Creative Stall from the Noun Project Bus tickets by Iulia Ardeleanu from the Noun Project Loyalty Card by icon 54 from the Noun Project Business card by Karthik Aathis from the Noun Project Pictures Broken phone from Faces from Eye with Google logo from 28
RFID and privacy - Some industry perspectives (ICC, EICTA)
RFID and privacy - Some industry perspectives (ICC, EICTA) Jeroen Terstegge ICC, EICTA OECD, Paris 2005-10-05 Identification Technologies: Connecting PEOPLE to Information, Entertainment and Services.
More informationISSUANCE AND CIVIL REGISTRATION
IDENTITY VERIFICATION IN PASSPORT ISSUANCE AND CIVIL REGISTRATION THE IMPORTANCE OF CONTEXT AND CONTINUITY OF IDENTITY Ross Greenwood Identity Matters Consulting Australia PURPOSE To invite a claim to
More informationData Protection and Ethics in Healthcare
Data Protection and Ethics in Healthcare Harald Zwingelberg ULD June 14 th, 2017 at Brocher Foundation, Geneva Organized by: with input by: Overview Goal: Protection of people Specific legal setting for
More informationSecure identity and electronic signatures essential for digital trust
Secure identity and electronic signatures essential for digital trust Betalingsformidlingskonferansen, November 16 th 2017 Eirik Dalen, Signicat (Eirik.dalen@Signicat.com) Signicat's vision is to be the
More informationCivil Registry System National Population Register
Civil Registry System National Population Civil Registration System National Population /Civil Registration of births and deaths is developed for the Ministry of State for Immigration and Registration
More informationSmart Cards in the Public Sector
Smart Cards in the Public Sector Interoperability within, across & beyond transport David Sentinella Department for Transport, Local Government and the Regions Cards Nov 2001 Slide No. 1 What is a Smart
More informationPersonal. Identity. Information
Personal Identity Information What is it? Work Membership Student Citizen Identity Healthcare On-line Financial Military What Is Identity Information? Definition: Identity information is an assortment
More informationTowards Health Data Democracy
Towards Health Data Democracy Bian Yang, Assoc. Prof., Dr., ehealth and Welfare Security group (ehws) at CCIS, Department of Information Security and Communication Technology Norwegian University of Science
More informationIdentity Management and its impact on the Digital Economy
Identity Management and its impact on the Digital Economy Alejandro Barros 1, Alejandro Pareja 2 October 2016 Contents Introduction... 2 Identity Management... 3 Enrolment in the National Identity System...
More informationVictor Vega RFID Solutions Marketing Director NXP Semiconductors San Jose, CA
Victor Vega RFID Solutions Marketing Director NXP Semiconductors San Jose, CA Involved in RFID for 17 years. Responsibilities have ranged from design engineer to marketing director. Prior employment engagements
More informationSystem Audit Checklist
System Audit Checklist Contents 1 Gaming System... 3 1.1 System Architecture... 3 1.2 Application Architecture... 3 1.3 Infrastructure Network... 3 1.4 Licence Category... 3 1.5 Random Number Generator...
More informationFAQ. What is OIX? Who is leading OIX?
FAQ What is OIX? The Open Identity Exchange (OIX) is a non-profit corporation serving as an independent, neutral provider of certification trust frameworks for open identity technologies. Who is leading
More informationEnabling Trust in e-business: Research in Enterprise Privacy Technologies
Enabling Trust in e-business: Research in Enterprise Privacy Technologies Dr. Michael Waidner IBM Zurich Research Lab http://www.zurich.ibm.com / wmi@zurich.ibm.com Outline Motivation Privacy-enhancing
More informationRick Clemmer Media briefing in China. Rick Clemmer, President & CEO NXP Semiconductors March 19, 2012 Shanghai
Rick Clemmer Media briefing in China Rick Clemmer, President & CEO NXP Semiconductors March 19, 2012 Shanghai Today s agenda NXP update Share our vision Zoom in China 2 NXP Semiconductors NXP Semiconductors
More informationThe future of IoT: Expert Survey results
The future of IoT: Expert Survey results The following paragraphs summarise the main findings of the foresight study on the future of the Internet of Things (IoT) and Ambient Intelligence (AmI). The study
More informationSimpleFX Verification Guide 11th of September
1 HOW TO UPLOAD VERIFICATION DOCUMENTS AND FILL VERIFICATION FORM 1. Login on our website and go to your profile page: https://app.simplefx.com/profile/verification 2. Choose account type and your location.
More informationNew Age Vital Statistics Services: What They Do and Don t Do
New Age Vital Statistics Services: What They Do and Don t Do Author: Guy Huntington, President, Huntington Ventures Ltd. Date: June 2018 Table of Contents Executive Summary...3 What is a New Age Digital
More informationLecture 28: Applications of Crypto Protocols
U.C. Berkeley Lecture 28 CS276: Cryptography April 27, 2006 Professor David Wagner Scribe: Scott Monasch Lecture 28: Applications of Crypto Protocols 1 Electronic Payment Protocols For this section we
More informationPrivacy Policy SOP-031
SOP-031 Version: 2.0 Effective Date: 18-Nov-2013 Table of Contents 1. DOCUMENT HISTORY...3 2. APPROVAL STATEMENT...3 3. PURPOSE...4 4. SCOPE...4 5. ABBREVIATIONS...5 6. PROCEDURES...5 6.1 COLLECTION OF
More informationDigital Identity. Workshop. Roland Berger Munich Office
Digital Identity Workshop Roland Berger Munich Office 7 April 2017 We are looking forward to working with you in today's workshop Your Roland Berger hosts Sebastian Steger Stephan Janssens Sebastian Maus
More informationFull name of the following officers (or equivalent in each case) Title Full Given Name(s) of officer Surname
Identification form Associations Zurich account / policy number (if known) This Form must be completed together with your Zurich application or request form and mailed to:, Locked Bag 994, North Sydney
More informationAccessibility and Social Inclusion Black Country and DATES
Accessibility and Social Inclusion Black Country and DATES Dr Steve Cassidy Consultant to BCKS/Sheffield Dr Andy Dearden Sheffield Hallam University / British HCI Group BC e-learning Solutions For BC Business
More informationWhere s The Beep? Privacy, Security, & User (Mis)undestandings of RFID
Where s The Beep? Privacy, Security, & User (Mis)undestandings of RFID Jennifer King Research Specialist Overview Quick overview of RFID Research Question Context of Inquiry Study + findings Implications
More informationEavesdropping Attacks on High-Frequency RFID Tokens
Eavesdropping Attacks on High-Frequency RFID Tokens p. 1 Eavesdropping Attacks on High-Frequency RFID Tokens Gerhard P. Hancke July 11, 2008 Eavesdropping Attacks on High-Frequency RFID Tokens p. 2 What
More informationMEMBERSHIP APPLICATION
MEMBERSHIP APPLICATION CRITERIA FOR ENROLMENT 1. You are of Ngāti Whātua Ōrākei descent and your whakapapa can be traced to Tuperiri. 2. You must provide a copy of your full Birth Certificate and one form
More informationA Simple and Secure E-Ticketing System for Intelligent Public Transportation based on NFC. Ivan Gudymenko Felipe Sousa Stefan Köpsell
A Simple and Secure E-Ticketing System for Intelligent Public Transportation based on NFC Ivan Gudymenko Felipe Sousa Stefan Köpsell Outline Introduction System Description Validation A Simple and Secure
More informationBALTIMORE CITY DEPARTMENT OF RECREATION AND PARKS Permit Office 301 East Drive, Phone: /6003 Fax:
BALTIMORE CITY DEPARTMENT OF RECREATION AND PARKS Permit Office 301 East Drive, 21217 Phone: 410-396-7070/6003 Fax: 410-662-7158 METAL DETECTING PERMIT APPLICATION AND CERTIFICATION FORM PLEASE PRINT CLEARLY
More informationNational population registers in a Europe without barriers
National population registers in a Europe without barriers Hendrik Tamm eid and Public Registers Conference Hradec Králov, 07th April 2009 Registry Information Service on European Residents Population
More informationAuthenticated Document Management System
Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College
More informationQuestion and Response Guide to Issuing Certified Copies of Vital Records
February 28, 2011 Question and Response Guide to Issuing Certified Copies of Vital Records Who may receive certified copies of vital record? State law only allows a certified copy of a vital record to
More informationFastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC)
FastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC) EAB - Research Project Conference, Darmstadt, September 19 th, 2016 Presented by Markus Clabian Senior Research Engineer,
More informationD8.12 Architecture for Standardization V2
Attribute-Based Credentials for Trust D8.12 Architecture for Standardization V2 Fatbardh Veseli, Dieter M. Sommer, Jan Schallaöck, Ioannis Krontiris Editor: Reviewers: Identifier: D8.12 Type: Version:
More informationPanel on Adaptive, Autonomous and Machine Learning: Applications, Challenges and Risks - Introduction
Panel on Adaptive, Autonomous and Machine Learning: Applications, Challenges and Risks - Introduction Prof. Dr. Andreas Rausch Februar 2018 Clausthal University of Technology Institute for Informatics
More informationOwning Identity One or many: Do we have a choice?
Uberveillance 29 Oct 2007 Owning Identity One or many: Do we have a choice? Marcus Wigan Oxford Professor Emeritus Napier University Edinburgh Professorial Fellow: Melbourne Visiting Professor: Imperial
More informationcommitted to Europe big & fast data for smart city applications GSMA Smart Cities, Brussels 6 Sept. 2013
big & fast data for smart city applications GSMA Smart Cities, Brussels 6 Sept. 2013 Nicolas de Cordes VP Marketing Vision, Group Marketing, Orange committed to Europe GSMA Smart Cities, Brussels Sept
More informationNorthfleet Technology College Course Outline: Information Technology in a Global Society
Northfleet Technology College Course Outline: Information Technology in a Global Society Equivalent to ½ A level Introduction: What is ITGS Information Technology in a Global Society International refers
More informationHTL Leonding, Department for Informatics and Software Engineering. Bachelors Program in Computer Science, Johannes Kepler University Linz
Matthias Steinbauer Personal Data Name Date of Birth Citizenship e-mail Dipl.-Ing. Matthias Steinbauer, Bakk.-techn. 3rd of January 1983, Linz, Austria Austria matthias@steinbauer.org Affiliation University
More informationDistributed Artificial Intelligence Laboratory. Future in touch. at CeBIT 2014 on March, 10th to 14th, Hall 9, Booth A 44
EN Distributed Artificial Intelligence Laboratory Future in touch at CeBIT 2014 on March, 10th to 14th, Hall 9, Booth A 44 Distributed Artificial Intelligence Laboratory The DAI-Labor and the associated
More informationLIT FACTORY DIE SMARTE FORSCHUNGSFABRIK FÜR LEICHTBAU, RECYCLING UND RECOMPOUNDING. Univ.-Prof. Dipl.-Ing. Dr. Jürgen Miethlinger MBA
DIE SMARTE FORSCHUNGSFABRIK FÜR LEICHTBAU, RECYCLING UND RECOMPOUNDING Univ.-Prof. Dipl.-Ing. Dr. Jürgen Miethlinger MBA Leitung of LIT Factory Tel.: +43 732 2468 6572 juergen.miethlinger@jku.at lit.factory@jku.at
More information8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector
8 Executive summary Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector The hectic demands of modern lifestyles, combined with the growing power of information technology,
More informationOpportunities and threats and acceptance of electronic identification cards in Germany and New Zealand. Masterarbeit
Opportunities and threats and acceptance of electronic identification cards in Germany and New Zealand Masterarbeit zur Erlangung des akademischen Grades Master of Science (M.Sc.) im Studiengang Wirtschaftswissenschaft
More information»INDUSTRIAL DATA SPACE AND THE NEED FOR TRANSFORMING MANUFACTURING IN EMERGING
INDUSTRY 4.0»INDUSTRIAL DATA SPACE AND THE NEED FOR TRANSFORMING MANUFACTURING IN EMERGING ECONOMIES «Kay Matzner Fraunhofer Gesellschaft (IFF) Germany Manufuture 2017 October 24 Tallinn-Estonia Nmedia
More informationPerformance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication
Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication Ahmet Onur Durahim, İsmail Fatih Yıldırım, Erkay Savaş and Albert Levi durahim, ismailfatih, erkays, levi@sabanciuniv.edu
More informationForeword The Internet of Things Threats and Opportunities of Improved Visibility
Foreword The Internet of Things Threats and Opportunities of Improved Visibility The Internet has changed our business and private lives in the past years and continues to do so. The Web 2.0, social networks
More informationReplacing Lost or Damaged Papers
Chapter 5: Home Recovery 1. Birth and Death Certificates 2. Citizenship and Naturalization Papers 3. Driver's License 4. Income Tax Returns 5. Insurance Policies 6. Military Discharge Papers 7. Marriage
More informationAU PAIR REGISTRATION FORM
AU PAIR REGISTRATION FORM Basic Details: Name: Surname: Gender: Date of birth: Age: Physical address: Landline: Cell no: E-mail address: Religion: Marital status: Do you have children? Please provide details:
More informationNear Field Communication
Near Field Communication Research Study with IP Analysis & Mapping w w w. l e g a l a d v a n t a g e. n e t Contents Introduction History Patent analytics Market Litigations License agreements Applications
More informationA Case for Registrar Adoption of Blockchain and Self-Sovereign Identity Tech Talks Presented by TechConnect November 6, 2018
A Case for Registrar Adoption of Blockchain and Self-Sovereign Identity 2018 Tech Talks Presented by TechConnect November 6, 2018 A Case for Registrar Adoption of Blockchain and Self-Sovereign Identity
More informationMSc(CompSc) List of courses offered in
Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The
More informationFuture of Identity in the Information Society. An FP6 Network of Excellence
FIDIS Future of Identity in the Information Society An FP6 Network of Excellence Johann Wolfgang Goethe University Frankfurt Kai Rannenberg, Denis Royer Goethe University Frankfurt www.fidis.net Agenda
More informationV I S O c o r e I n s p e c t
V I S O c o r e I n s p e c t S o f t wa r e s o l u t i o n f o r s e c u r e d o c u m e n t v e r i f i c at i o n Passports and ID cards prove our identity. In order to improve and facilitate the verification
More informationF.A.Q. Card Holders & Merchants Card Holders
F.A.Q. Card Holders & Merchants Card Holders How do I check the balance of the card? Cards4all provides a 24 hour service via the Internet, simply put in the card number and the pin number. Card Holders
More informationA comprehensive guide to digital badges.
A comprehensive guide to digital badges. This is your in-depth guide to what digital badges are and how they are used. A FREE RESOURCE FROM ACCREDIBLE.COM A Comprehensive Guide to Digital Badges 2 Introduction
More informationBank of England Framework for the Testing of Automatic Banknote Handling Machines
Bank of England Framework for the Testing of Automatic Banknote Handling Machines 1. Introduction Maintaining confidence in the currency requires that cash users trust the physical integrity of the Bank
More informationPrivacy Self-Protection for Connected Cars
Privacy Self-Protection for Connected Cars Harald Zwingelberg ULD at the meeting of the International Working Group on Data Protection in Telecommunications Berlin, 22 November 2017 Partly based on research
More informationTOTAL DETECTOR COLLISION AVOIDANCE SYSTEM by Janus Technologies S.L. and Clock Technology S.L.
TOTAL DETECTOR COLLISION AVOIDANCE SYSTEM by Janus Technologies S.L. and Clock Technology S.L. RFID fundamentals System overview Loader setup Dumper setup Excavator setup Custom made options Price and
More informationVirtual Test Methods to Analyze Aircraft Structures with Vibration Control Systems
Virtual Test Methods to Analyze Aircraft Structures with Vibration Control Systems Vom Promotionsausschuss der Technischen Universität Hamburg-Harburg zur Erlangung des akademischen Grades Doktor-Ingenieur
More informationKIT to showcase self-learning humanoid robot at CEBIT
KIT to showcase self-learning humanoid robot at CEBIT Test Center for Autonomous Driving Uncrackable Digital Wallet Cloud Service Certification Virtual Health Assistant Quantum-based Prediction of Molecular
More informationInnovation in the identity domain: is ICAO s TRIP prepared for innovations?
Speech by Rhodia Maas, National Office for Identity Data, at ICAO conference, October 2017 Innovation in the identity domain: is ICAO s TRIP prepared for innovations? Ladies and gentlemen, first of all
More informationSystematic Privacy by Design Engineering
Systematic Privacy by Design Engineering Privacy by Design Let's have it! Information and Privacy Commissioner of Ontario Article 25 European General Data Protection Regulation the controller shall [...]
More informationMicro Sources of Data Aggregators
Micro Sources of Data Aggregators Case study: Etive Digital Log Book and Tower Hamlets Council Sponsored by: Contributors: Authors: Helen Wall, Wallogic and James Peart, GDS Published: February 2017 1
More informationHow to Pair AbiBird Sensor with App and Account
How to Pair AbiBird Sensor with App and Account By pairing your AbiBird sensor with your AbiBird app and account, you make it posible for signals to pass from the sensor, via the Cloud, to the AbiBird
More informationAN APPROACH TO ONLINE ANONYMOUS ELECTRONIC CASH. Li Ying. A thesis submitted in partial fulfillment of the requirements for the degree of
AN APPROACH TO ONLINE ANONYMOUS ELECTRONIC CASH by Li Ying A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Software Engineering Faculty of Science and
More information- A CONSOLIDATED PROPOSAL FOR TERMINOLOGY
ANONYMITY, UNLINKABILITY, UNDETECTABILITY, UNOBSERVABILITY, PSEUDONYMITY, AND IDENTITY MANAGEMENT - A CONSOLIDATED PROPOSAL FOR TERMINOLOGY Andreas Pfitzmann and Marit Hansen Version v0.31, Feb. 15, 2008
More informationSmart Government The Potential of Intelligent Networking in Government and Public Administration
Smart Government The Potential of Intelligent Networking in Government and Public Administration CeDEM 2016, Krems (Austria), 18.05.2016 Prof. Dr. Jörn von Lucke The Open Government Institute Zeppelin
More informationPrivacy and Security in Europe Technology development and increasing pressure on the private sphere
Interview Meeting 2 nd CIPAST Training Workshop 17 21 June 2007 Procida, Italy Support Materials by Åse Kari Haugeto, The Norwegian Board of Technology Privacy and Security in Europe Technology development
More informationGuidelines for Completion of a Youth Application
Guidelines for Completion of a Youth Application Office of the Métis Nation Saskatchewan Citizenship Registry 406 Jessop Ave Saskatoon, SK S7N 2S5 Ph (306) 343-8391 Toll Free: 1-888-203-6959 Fax (306)
More informationGuide to OverDrive for Students
Guide to OverDrive for Students Contents Getting Started Pg. 2 Finding our Library Pg. 4 Finding a Book I Want to Read Pg. 7 How do I Know if a Book is Available to Borrow? Pg. 11 How do I Borrow a Book?
More informationStandards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments
Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Antonio Kung, CTO 25 rue du Général Foy, 75008 Paris www.trialog.com 9 May 2017 1 Introduction Speaker Engineering
More informationCOMPRION Design Validation. Solution for Visualizing and Analyzing NFC Operating Volumes
COMPRION Design Validation Solution for Visualizing and Analyzing NFC Operating Volumes Measurement and Analysis of Contactless Interfaces with Design Validation Center The increasing availability of day-to-day
More information1040 DPI High Resolution Full-page epassport Reader Regula 8703
1040 DPI High Resolution Full-page epassport Reader Regula 8703 The world`s first mobile true high resolution full-page epassport reader featuring 1040 DPI resolution. Automatic reading and authenticity
More informationESB LOGISTICS LEARNING FACTORY. Prof. Dr. Ing. Dipl.-Ing. (FH) Vera Hummel, Dipl.-Ing (FH) Beate Brenner
International Academy for Production Engineering 7t th Conference on Learning Factories, Darmstadt, Germany, April 4 th to 5 th 2017 ESB LOGISTICS LEARNING FACTORY Digital twin as enabler for a SMART FACTORY
More informationCompact&Switch AccessControl
Compact&Switch AccessControl Paxton Access : Simple, Secure. access control from Paxton Access. Regain control of your building with access control Access control gives you control over who has access
More informationSelf-sovereign Identity Opportunities and Challenges for the Digital Revolution
Self-sovereign Identity Opportunities and Challenges for the Digital Revolution (Preprint, English Translation) Uwe Der 1, Stefan Jähnichen 2,3, Jan Sürmeli 2,3 Abstract. The interconnectedness of people,
More informationConnected Living -- Smart Cities The Impact of Big Data for Smart Cities. Smart Cities Forum, Brussels, 6 Sept 2013
Connected Living -- Smart Cities The Impact of Big Data for Smart Cities Smart Cities Forum, Brussels, 6 Sept 2013 Smart city mobile opportunity of USD 67bn by 2020 Smart Cities market opportunity by 2020
More informationPORT MOODY POLICE DEPARTMENT
Revised. 2008-08-27 APPLICATION DATE YEAR MONTH DAY PORT MOODY POLICE DEPARTMENT EMPLOYMENT APPLICATION (EXEMPT CANDIDATE) Carefully read the following instructions before commencing the task of completing
More informationConnected Living -- Smart Cities Developing collaborative mobile-based city solutions for smart cities
Connected Living -- Smart Cities Developing collaborative mobile-based city solutions for smart cities Connected Living Summit, Shanghai, 24 June 2013 Table of Contents Introduction to the GSMA s Smart
More informationTechnologies that will make a difference for Canadian Law Enforcement
The Future Of Public Safety In Smart Cities Technologies that will make a difference for Canadian Law Enforcement The car is several meters away, with only the passenger s side visible to the naked eye,
More informationINTERNET OF THINGS (IoT) PRESENTED BY: Wafaa Rizin Ameer
INTERNET OF THINGS (IoT) PRESENTED BY: Wafaa Rizin Ameer INTRODUCTION IoT: All about physical items talking to each other The term coined by Kevin Ashton in 1999 Composed by two words and concepts: Internet
More informationSecond Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security
Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Face Biometric Capture & Applications Terry Hartmann Director and Global Solution Lead Secure Identification & Biometrics UNISYS
More informationDigital Identity Innovation Canada s Opportunity to Lead the World. Digital ID and Authentication Council of Canada Pre-Budget Submission
Digital Identity Innovation Canada s Opportunity to Lead the World Digital ID and Authentication Council of Canada Pre-Budget Submission August 4, 2017 Canadian governments, banks, telcos, healthcare providers
More informationPrivacy by Design: Integrating Technology into Global Privacy Practices
Privacy by Design: Integrating Technology into Global Privacy Practices Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada Harvard Privacy Symposium August 23, 2007 Role of the IPC
More informationLaser Surface Authentication TM : biometrics for documents and goods
Laser Surface Authentication TM : biometrics for documents and goods Professor Russell Cowburn Professor of Nanotechnology, Department of Physics, Imperial College London, UK. Chief Technical Officer,
More informationTOYOTA FINANCE ONLINE USER GUIDE
TOYOTA FINANCE ONLINE USER GUIDE Introducing Toyota Finance Online, the easy way to manage your account Toyota Finance Online is the easy way to manage your account online. You can change your correspondence
More informationPrivacy engineering, privacy by design, and privacy governance
CyLab Lorrie Faith Cranor" Engineering & Public Policy acy & Secur ity Priv e l HT TP ratory bo La 8-533 / 8-733 / 19-608 / 95-818:! Privacy Policy, Law, and Technology CyLab U sab November 17, 2015 ://
More informationOperational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary. Version 3.
Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary Version 3.2 July 25, 2005 Table of Contents 1 Introduction...1 1.1
More informationBig Data, privacy and ethics: current trends and future challenges
Sébastien Gambs Big Data, privacy and ethics 1 Big Data, privacy and ethics: current trends and future challenges Sébastien Gambs Université du Québec à Montréal (UQAM) gambs.sebastien@uqam.ca 24 April
More informationCurriculum Vitae. Claude Barral Expert Security Scientist
Curriculum Vitae Expert Security Scientist Address n o 6 La Bastide Samat 13119 Saint Savournin, France Mobile : +33.6.86.83.19.55 Email: claude.barral@gmail.com Email: claude.barral@bactech.fr Homepage:
More informationYOUR SOCIAL MEDIA WORKSHOP
YOUR SOCIAL MEDIA WORKSHOP Did You Hear? User Stats On Social Media BUT HOLD ON! WHO REALLY CARES ABOUT PICTURES OF YOUR LUNCH? You Might Be Thinking What about my personal privacy? Will social media become
More informationDecentralisation, i.e. Internet for Social Good
Decentralisation, i.e. Internet for Social Good Fabrizio Sestini DG CONNECT E3 (Next-Generation Internet) http://ec.europa.eu/digital-single-market/en/collectiveawareness * The personal views expressed
More informationComparison ibeacon VS Smart Antenna
Comparison ibeacon VS Smart Antenna Introduction Comparisons between two objects must be exercised within context. For example, no one would compare a car to a couch there is very little in common. Yet,
More informationSECURITY OF LOYALTY CARDS USED IN ESTONIA. Name: Danielle Morgan Supervisor: Rain Ottis Co-Supervisor: Arnis Paršovs
SECURITY OF LOYALTY CARDS USED IN ESTONIA Name: Danielle Morgan Supervisor: Rain Ottis Co-Supervisor: Arnis Paršovs 1 LOYALTY CARDS Loyalty schemes are offered by merchants to provide repeat customers
More informationEmbracing Open Title Innovation Platforms
Embracing Open Title Innovation Platforms Sub-title Not all the smart people work for us. We need to work with smart people inside and outside the company.» Chesbourgh PLACE PARTNER S LOGO HERE European
More informationAppointment of an agent form
Appointment of an agent form An agent is someone who can act for you when dealing with a service of the Ministry of Social Development or a contracted service provider (if you have one assigned to you).
More informationQuantitative Low Current Ion Beam Characterization by Beam Profiling and Imaging via Scintillation Screens
Quantitative Low Current Ion Beam Characterization by Beam Profiling and Imaging via Scintillation Screens 17.03.2016, Mühlleithen XIII. Erfahrungsaustausch: Oberflächentechnologie mit Plasma- und Ionenstrahlprozessen,
More informationDecentralized Protocol for Self-Sovereign Identities with Embedded Compliance
Decentralized Protocol for Self-Sovereign Identities with Embedded Compliance A self-sovereign identity portal for regulated industries and the Internet of Everything guy.davies@blockpass.org www.blockpass.org
More informationMira M-3 Handheld Raman Spectrometer. On-site verification of materials in seconds
Mira M-3 Handheld Raman Spectrometer On-site verification of materials in seconds Mira M-3 compact, fast, and highly accurate 02 The Mira M-3 is one of the fastest and most compact handheld Raman spectrometers
More informationibeacon Spoofing Security and Privacy Implications of ibeacon Technology Karan Singhal
ibeacon Spoofing Security and Privacy Implications of ibeacon Technology Karan Singhal ABSTRACT Apple introduced ibeacons with ios 7, revolutionizing the way our phones interact with real- life places
More informationPROTECTION GOALS FOR PRIVACY ENGINEERING
PROTECTION GOALS FOR PRIVACY ENGINEERING Marit Hansen, Meiko Jensen, and Martin Rost International Workshop on Privacy Engineering May 21, 2015 Outline Security Protection Goals Privacy Protection Goals
More informationIssuing an ewic Card. Important points to remember about Issuing an ewic Card in Crossroads:
The Issue EBT Card Quick Link is located under Certification in the Quick Links box in Crossroads. It is not starred as a required field. Important points to remember about in Crossroads: An ewic Card
More information