6 resultados para Public Key cryptography
em Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho"
Resumo:
Pós-graduação em Matemática Universitária - IGCE
Resumo:
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on conventional cryptographic systems, as the passwords can be easily copied or stolen. The usage of a biometric approach for releasing the keys is an alternative to the password-based mechanisms. But just like passwords, we need mechanisms to keep the biometrical signal safe. One approach for such mechanism is to use biometrical key cryptography. The cryptographic systems based on the use of biometric characteristics as keys are called biometrical cryptographic systems. This article presents the implementation of Fuzzy Vault, a biometrical cryptographic system written in Java, along with its performance evaluation. Fuzzy Vault was tested on a real application using smartcards.
Resumo:
Pós-graduação em Ciências Sociais - FFC
Resumo:
This article examines the interplay between legitimacy and context as key determinants of public sector reform outcomes. Despite the importance of variables Such as legitimacy of public institutions, levels of civic morality and socio-economic realities, reform strategies often fail to take such contextual factors into account. The article examines, first, relevant literature both conceptual and empirical, including data from the World Values Survey project. It is argued that developing countries have distinctive characteristics which require particular reform strategies. The data analysed shows that in Latin American countries, there is no clear Correlation between confidence in public institutions and civic morality. Other empirical studies show that unemployment has a negative impact on the level of civic morality, while inequality engenders corruption. This suggests that poorer and socio-economically stratified countries face greater reform challenges owing to the lack of legitimacy of public institutions. The article concludes that reforms should focus on areas of governance that impact on poverty. This will in turn help produce more stable outcomes. Copyright (C) 2008 John Wiley & Sons, Ltd.
Resumo:
Medical images are private to doctor and patient. Digital medical images should be protected against unauthorized viewers. One way to protect digital medical images is using cryptography to encrypt the images. This paper proposes a method for encrypting medical images with a traditional symmetric cryptosystem. We use biometrics to protect the cryptographic key. Both encrypted image and cryptographic key can be transmitted over public networks with security and only the person that owns the biometrics information used in key protection can decrypt the medical image. © Springer Science+Business Media B.V. 2008.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)