[PDF][PDF] E-Government-an information security perspective
RG Hassan, OO Khalifa - International Journal of Computer …, 2016 - researchgate.net
The growth and rapid adoption of the Internet has greatly changed how all organizations
deal with their respective stakeholders. As the move from administrative operations to …
deal with their respective stakeholders. As the move from administrative operations to …
Evaluation of users' knowledge and concerns of biometric passport systems
The increase in terrorism and identity fraud has forced governments worldwide to make a
combined effort to enhance the security of national borders. Biometric passports are the …
combined effort to enhance the security of national borders. Biometric passports are the …
The impact of face image compression in future generation electronic identity documents
Electronic identity documents are spreading worldwide and the digital identification
procedures relying on them are increasingly important for national and international security …
procedures relying on them are increasingly important for national and international security …
Non-use of automated border control systems: Identifying reasons and solutions
AM Oostveen - Proceedings of the 28th International BCS …, 2014 - scienceopen.com
There are many reasons why passengers are unable or reluctant to use self-service e-gate
systems. In order for designers to build better systems with higher uptake by end-users they …
systems. In order for designers to build better systems with higher uptake by end-users they …
Encryption and encoding of facial images into quick response and high capacity color 2d code for biometric passport security system
ZH Choudhury - arxiv preprint arxiv:2203.15738, 2022 - arxiv.org
In this thesis, a multimodal biometric, secure encrypted data and encrypted biometric
encoded into the QR code-based biometric-passport authentication method is proposed for …
encoded into the QR code-based biometric-passport authentication method is proposed for …
Lightweight Security Settings in RFID Technology for Smart Agri-Food Certification
In this paper we propose a novel technique to implement secure and efficient applications
for the agri-food certification chain. Our proposal relies on RFID technologies which is …
for the agri-food certification chain. Our proposal relies on RFID technologies which is …
Preserving context security in AWS IoT Core
L Calderoni - Proceedings of the 14th International Conference on …, 2019 - dl.acm.org
Cloud computing platforms are widely used as enabling frameworks for the Internet of
Things. Within this context, a number of peripheral devices are connected to the middleware …
Things. Within this context, a number of peripheral devices are connected to the middleware …
Efficient Security and Privacy Protection for Large-scale Wireless Indoor Positioning Applications
MF Sadikin - 2015 - refubium.fu-berlin.de
The emerging of Wireless Indoor Positioning (WIP) technology has become prominent
solution in the context of location awareness applications. Nevertheless, WIP system …
solution in the context of location awareness applications. Nevertheless, WIP system …
Distributed smart city services for urban ecosystems
L Calderoni - 2015 - amsdottorato.unibo.it
A Smart City is a high-performance urban context, where citizens live independently and are
more aware of the surrounding opportunities, thanks to forward-looking development of …
more aware of the surrounding opportunities, thanks to forward-looking development of …
Waveguide-based machine readable fluorescence security feature for border control and security applications
J Johny, K Bhavsar, S Officer… - Counterterrorism …, 2018 - spiedigitallibrary.org
Border security challenges and immigration issues are increasing considerably in recent
years. Counterfeiting and fraudulent use of identity and other travel documents are posing …
years. Counterfeiting and fraudulent use of identity and other travel documents are posing …