Security role of biometrics in electronic transactions

Anshuman Tyagi, P. Singh, Vikas Yadav, Sangharsh Kumar Singh, A. Tiwari
{"title":"Security role of biometrics in electronic transactions","authors":"Anshuman Tyagi, P. Singh, Vikas Yadav, Sangharsh Kumar Singh, A. Tiwari","doi":"10.1109/ICCIC.2012.6510268","DOIUrl":null,"url":null,"abstract":"As electronics transaction are increasing in day-by-day in common man's life therefore it is luring to people involve in unlawful activity to commit frauds in electronics tractions also. They understand the weakness of the system and exploit. Though may very effective Public-Private-Key based algorithms have be developed providing security for transmissions of electronic data still have room for leakage of key? If we use biometrics based encryption in electronic transmission then we can ensure most safe transmission of data, especially in commercial tractions. Let us understand the biometrics and area which must use it. In any application having electronic communication has some most common security requirements are Authentication, Privacy/confidentiality, Integrity and Non-repudiation. The Cryptography not only protects data from alteration or theft, but it can also be used for user authentication.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Conference on Computational Intelligence and Computing Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIC.2012.6510268","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

As electronics transaction are increasing in day-by-day in common man's life therefore it is luring to people involve in unlawful activity to commit frauds in electronics tractions also. They understand the weakness of the system and exploit. Though may very effective Public-Private-Key based algorithms have be developed providing security for transmissions of electronic data still have room for leakage of key? If we use biometrics based encryption in electronic transmission then we can ensure most safe transmission of data, especially in commercial tractions. Let us understand the biometrics and area which must use it. In any application having electronic communication has some most common security requirements are Authentication, Privacy/confidentiality, Integrity and Non-repudiation. The Cryptography not only protects data from alteration or theft, but it can also be used for user authentication.
生物识别技术在电子交易中的安全作用
随着电子交易在普通人的生活中日益增加,因此它也诱使人们参与非法活动,在电子交易中进行欺诈。他们了解系统的弱点并加以利用。虽然已经开发出了非常有效的基于公私密钥的算法,为电子数据的传输提供了安全保障,但仍然存在密钥泄露的空间?如果我们在电子传输中使用基于生物特征的加密技术,那么我们可以确保最安全的数据传输,特别是在商业牵引中。让我们了解一下生物识别技术和必须使用它的领域。在任何具有电子通信的应用程序中,最常见的安全要求是身份验证、隐私/机密性、完整性和不可否认性。密码学不仅可以保护数据不被篡改或窃取,还可以用于用户身份验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信