[PDF][PDF] E-Government-an information security perspective

RG Hassan, OO Khalifa - International Journal of Computer …, 2016 - researchgate.net
The growth and rapid adoption of the Internet has greatly changed how all organizations
deal with their respective stakeholders. As the move from administrative operations to …

Evaluation of users' knowledge and concerns of biometric passport systems

T Habibu, ET Luhanga, AE Sam - Data, 2019 - mdpi.com
The increase in terrorism and identity fraud has forced governments worldwide to make a
combined effort to enhance the security of national borders. Biometric passports are the …

The impact of face image compression in future generation electronic identity documents

L Calderoni, A Magnani - Forensic Science International: Digital …, 2022 - Elsevier
Electronic identity documents are spreading worldwide and the digital identification
procedures relying on them are increasingly important for national and international security …

Non-use of automated border control systems: Identifying reasons and solutions

AM Oostveen - Proceedings of the 28th International BCS …, 2014 - scienceopen.com
There are many reasons why passengers are unable or reluctant to use self-service e-gate
systems. In order for designers to build better systems with higher uptake by end-users they …

Encryption and encoding of facial images into quick response and high capacity color 2d code for biometric passport security system

ZH Choudhury - arxiv preprint arxiv:2203.15738, 2022 - arxiv.org
In this thesis, a multimodal biometric, secure encrypted data and encrypted biometric
encoded into the QR code-based biometric-passport authentication method is proposed for …

Lightweight Security Settings in RFID Technology for Smart Agri-Food Certification

L Calderoni, D Maio - 2020 IEEE International Conference on …, 2020 - ieeexplore.ieee.org
In this paper we propose a novel technique to implement secure and efficient applications
for the agri-food certification chain. Our proposal relies on RFID technologies which is …

Preserving context security in AWS IoT Core

L Calderoni - Proceedings of the 14th International Conference on …, 2019 - dl.acm.org
Cloud computing platforms are widely used as enabling frameworks for the Internet of
Things. Within this context, a number of peripheral devices are connected to the middleware …

Efficient Security and Privacy Protection for Large-scale Wireless Indoor Positioning Applications

MF Sadikin - 2015 - refubium.fu-berlin.de
The emerging of Wireless Indoor Positioning (WIP) technology has become prominent
solution in the context of location awareness applications. Nevertheless, WIP system …

Distributed smart city services for urban ecosystems

L Calderoni - 2015 - amsdottorato.unibo.it
A Smart City is a high-performance urban context, where citizens live independently and are
more aware of the surrounding opportunities, thanks to forward-looking development of …

Waveguide-based machine readable fluorescence security feature for border control and security applications

J Johny, K Bhavsar, S Officer… - Counterterrorism …, 2018 - spiedigitallibrary.org
Border security challenges and immigration issues are increasing considerably in recent
years. Counterfeiting and fraudulent use of identity and other travel documents are posing …