The Electronic ID and the Voting Admission using a Cell Phone

Size: px
Start display at page:

Download "The Electronic ID and the Voting Admission using a Cell Phone"

Transcription

1 The Electronic ID and the Voting Admission using a Cell Phone Tetsuji KOBAYASHI *, Jaewook KIM * and Norifumi MACHIDA * * Nippon Institute of Technology Department of Computer and Information Engineering Joho-Building, 4-1-1, Gakuendai, Miyashiro-machi, Saitama-ken, Japan ABSTRACT This paper proposes a personal identification method using a cell phone to improve the function of ID cards and also proposes the application to the electronic voting admission. The method is called as the electronic ID using a cell phone. The personal identification data are stored in the server. Each user receives the data from the server on each cell phone. The cell phone displays the text data (name, affiliation, etc.), face images and a two-dimensional The examiner checks the displayed information by using the examiner s terminal computer. The mechanism uses message authentication and encryption to establish the security among the server, the cell phone and the examiner s terminal. The mechanism of the proposed electronic ID can be applied to the electronic voting admission for improving the current voting admission system in the election of the national or local government. The proposed voting admission can improve the services for voters and decrease the cost for voting admission remarkably. Keywords: cell phone, personal identification, security, two-dimensional symbol, voting admission 1 INTRODUCTION Personal identification is important in various information systems. Plastic cards and smart cards are used as ID (identification) cards. In some countries including Japan, many people have color display cell phones. If a cell phone is used for personal identification, it is possible to show all of the identification information on the color display of the cell phone. Two-dimensional symbols are constructed by means of extending the functions of barcodes [1]. A twodimensional symbol has large recording capacity and error correction capability. There are various kinds of twodimensional symbols. Two-dimensional symbol can be classified as a stack type and a matrix type. The stack type symbol such as PDF417 is constructed by stacking multiple low-height barcodes. The matrix type symbol such as QR code is constructed to store a black or white pattern into a cell that corresponds to a pixel of an image. Although twodimensional symbols are used for a ticket such as an airline company, it has nothing to do with personal identification. By using the two-dimensional symbol for the personal identification system using a cell phone, the identification data can be quickly read from the two-dimensional symbol scanner attached to the examiner s terminal computer. The encryption and authentication techniques can be used for the security of the two-dimensional symbol [2]. The authors proposed a personal identification method using a cell phone for improving the function of ID cards, and the prototype was constructed and the evaluation was reported [3], [4]. There are local governments that use the electronic voting system in Japan [5]. However, the voting admission is out of scope. The mechanism of the proposed personal identification method can be applied to the voting admission for improving the current voting admission in the election of the central or local government. The electronic voting admission proposed in this paper can improve the services for the voters and can remarkably decrease the cost of the voting admission. 2 PERSONAL IDENTIFICATION 2.1 The Concept of the Electronic ID for Personal Identification The fundamental concept of the proposed personal identification method using a cell phone is summarized. (1) The personal identification data are stored in the database of a server (or a computer center). (2) Each user receives the personal identification data from the server on each cell phone. The time when the user receives the personal identification data depends on the application. It is possible for the user to request the personal identification data of the server. It is also possible that the server automatically sends the personal identification data to the cell phone at the appropriate time decided by the application. (3) The cell phone displays the personal identification data that consist of text data (name, address, etc.) and image data (face image, etc.). The examiner checks these data. (4) The cell phone additionally displays the two-dimensional symbol including the personal identification data. The purpose of the two-dimensional symbol is to read the data by the two-dimensional symbol scanner and automatically process the data at the terminal computer of the examiner. (5) The encryption and authentication techniques are used for the security of the two-dimensional symbol in the cell

2 phone. Additionally, the two-dimensional symbol can include the timestamp to limit the time interval for the personal identification data. (6) The personal identification is performed not only when the examiner s terminal can communicate with the server (i.e., on-line identification), but also when the examiner s terminal cannot communicate with the server on account of its failure (i.e., off-line identification). 2.2 Main Problems and Solutions Main problems and solutions to implement the proposed concept are described as follows. Problem-1: The transmission data from the server to the cell phone such as the ordinary compressed face image and the personal text data cannot be encrypted in many cases because most of cell phones do not have encryption and decryption functions for data. The solution for problem-1: The authentication code is generated for the ordinary compressed face image and the personal text data, and it is stored in the two-dimensional The data stored in the two-dimensional symbol are encrypted. The examiner s terminal can read the twodimensional symbol from the scanner and decrypt the data. The personal text data transmitted from the server to the cell phone without encryption are limited to the public basic personal data. The secret detailed personal data with encryption are stored in the two-dimensional Problem-2: When the examiner s terminal is unable to communicate with the server because of failures, it should perform personal authentication by only using the displayed information of the user s cell phone. The solution for problem-2: All of the data for personal identification are stored in the two-dimensional Problem-3: Since the size of the two- dimensional symbol displayed on a cell phone is small because of its display size, the ordinary compressed face image is too large to store in the two-dimension The solution for problem-3: The highly compressed face image with high compression rate is stored in the twodimensional Problem-4: The personal text data can be divided into the public basic text data (name, user ID, affiliation), and the secret detailed text data (name, user ID, affiliation, birth date, telephone number, address, etc.). (Note: The secret detailed text data include the public basic text data.) The solution for problem-4: The text data transmitted to the user's cell phone from the server by without enciphering are the public basic text data. Since the secret detailed text data include privacy information, they are enciphered and stored in the two-dimensional Problem-5: The data from the server to the examiner s terminal consist of the downloaded data from the server and the data obtained from the two-dimensional symbol displayed on the cell phone. These data can be categorized as the duplicated data and the non-duplicated data. It is necessary to certify the correctness and minimize the processing amount and the transmitted data amount. The solution for problem-5: The scheme to use multiple message authentication codes (or digital signatures) is devised. 2.3 Proposed Method for the Electronic ID The proposed electronic ID for personal identification using a cell phone is described in detail in this chapter. Main elements for the proposed method are shown in Fig. 1. (MAC: Message Authentication Code). Public basic personal text data. [Download] [Server] Ordinary compressed face image. MAC-B MAC-A (copy) Examiner s terminal. Two-dimensional symbol scanner. [ or download] Fig. 1: Main elements for the proposed method. 2.4 The Server Two-dimensional Secret detailed personal text data. Highly compressed face image. MAC-A User s cell phone. (1) The examiner produces an ordinary compressed face image and a highly compressed face image by using the face image of the user. Each of compressed face images has each compression rate. The user ID is embedded in the ordinary compressed face image by using digital watermarking to protect it from the intruder of the server. (2) The server obtains the public basic personal text data (name, user ID, and affiliation), the ordinary compressed face image, and the data for the two-dimensional The data for the two-dimensional symbol consist of the following data: the highly compressed face image and the secret detailed personal text data (name, user ID, affiliation,

3 birth date, phone number, address, creation date, expiration date, and other additional data). (3) The server creates MAC-A as the message authentication code (or digital signature) for the data of the twodimensional symbol such as the highly compressed face image and the secret detailed personal text data. (4) The server creates MAC-B as the message authentication code (or digital signature) for the transmission data to the cell phone and the examiner s terminal such as the public basic personal text data (name, user ID, and affiliation), the ordinary compressed face image, and the data for the twodimensional (5) The server encrypts the secret detailed personal text data, the highly compressed face image and MAC-A. The server stores the encrypted data in the two-dimensional (6) The server transmits the ordinary compressed face image, the public basic personal text data and the two-dimensional symbol, to the cell phone. These data are transmitted by from the server (or downloaded by the user from the Web browser of the cell phone). (7) Both of the encryption key and the authentication key are shared between the server and the examiner s terminal. The method to verify the communication among the server, the cell phone and the examiner s terminal is shown in Table 1. Table 1: The method to verify the communication. Items for verification. The method for verification by using multiple message authentication codes. The correctness of the The concordance between the two-dimensional MAC-A in the two-dimensional symbol transmitted to symbol and the MAC generated the cell phone from from the data in the twodimensional the server. The correctness of the downloaded data to the terminal from the server. The correctness between the downloaded data and the displayed data on the cell phone 2.5 The Cell Phone of the User The concordance between the MAC-B in the downloaded data and the MAC generated from the downloaded data. The concordance between the MAC-A in the two-dimensional symbol of the cell phone and the copy of MAC-A that is stored in the downloaded data. (1) The cell phone of the user receives the ordinary compressed face image, the public basic personal text data and the two-dimensional symbol from the server. (2) The user displays and shows the public basic personal text data, the ordinary compressed face image, and the twodimensional symbol on the cell phone according to the guidance of the examiner. 2.6 On-line Identification by the Examiner The on-line identification is the personal identification when the examiner s terminal computer can communicate with the server. The procedure is described as follows. (1) The examiner s terminal downloads the public basic personal text data, the secret detailed personal text data, the ordinary compressed face image, the highly compressed face image, the MAC-B and the copy of MAC-A. These data are protected by the SSL (secure sockets layer) protocol. (2) The examiner s terminal reads the two-dimensional symbol on the cell phone from the two-dimensional symbol scanner. The data in the two-dimensional symbol are decoded and stored in the examiner s terminal. (3) The examiner s terminal verifies the MAC-B by creating the new MAC-B. It also verifies the copy of MAC-A obtained from the server and the MAC-A obtained from the two-dimensional symbol obtained from the cell phone. When they are correct, this procedure continues to the next. (4) The examiner s terminal verifies the MAC-A by creating the new MAC-A from the data in the two-dimensinal (5) The examiner s terminal displays the secret detailed personal text data and the ordinary compressed face image. The examiner checks the correctness of the displayed data and the live face image of the user of the cell phone. 2.7 Off-line Identification by the Examiner The off-line identification is necessary when the examiner s terminal cannot communicate with the server on account of the failure of the server or the communication line. The procedure for the off-line identification is described as follows. The data in the two-dimensional symbol are obtained and decrypted. The MAC-A is verified by using only the data stored in the two-dimensional The secret detailed personal text data and the highly compressed face image are displayed on the examiner s terminal. The examiner checks the data, and checks the face image by looking at the live face. The result is recorded and shall be dually verified when the examiner s terminal is able to access the server. Although the on-line identification uses the ordinary compressed face image, the off-line identification uses the highly compressed face image because the two-dimensional symbol has a capacity limit such as the maximum value is about 2,000 bytes for the current cell phone and the two-dimensional symbol scanner. 2.8 Merits of the Electronic ID The proposed personal identification method using a cell phone has the following merits. As the face image displayed on the cell phone is large enough in comparison with the photograph size of the ordinary plastic ID card, the precision increases when the examiner compares the displayed face image to the live face. As the personal identification data can

4 be directly read from the two-dimensional symbol scanner, the data can be automatically processed by the examiner s terminal. The cost to produce ID cards is decreased because no ID card is used. By using the two-dimensional symbol for the ID system using a cell phone, the forgery becomes difficult and the time for checking the contents of the ID data is reduced. The attacks and counter measures with regard to the proposed electronic ID are shown in Table 2. Table 2: The attacks and counter measures with regard to the proposed electronic ID. Attacks Counter measures against the attacks The attacker may access This attack can be defended the fraudulent Web site when the correct Web site created by the attacker, and attaches the authentication the attacker may display code for the data in the the fake data on the display two-dimensional of the cell phone. The attacker displays the two-dimensional symbol that is illegally obtained from the correct person s cell phone, or copied from the display. The intruder for the server modifies the personal identification data in the database of the server. Since the face image is displayed on the cell phone, the checking person can compare the face image to the live face. It is very difficult to intrude the secure server, to modify the personal identification data, and to generate the twodimensional 3 THE ELECTRONIC VOTING ADMISSION 3.1 Problems of the Voting Admission The proposed identification method can be applied to various applications. This paper proposes a voting admission method for the elections of national or local governments. A set of voting admission tickets for each voter is mailed to each household that consists of one or more voters in the elections of Japan. Each voter goes to each specified voting place with the voting admission ticket, and the voter receives a ballot sheet to cast a vote in exchange for the voting admission ticket at the specified voting place. However, there are following problems in the current voting admission system. [Problem-A]: Since the admission ticket is mailed earlier than the day of election, there are voters who may lose the voting admission ticket. [Problem-B]: Since two or more voting places are printed on the voting admission ticket and one of them is specified for each voter (the purpose is to decrease the printing cost), there is a voter who mistakes the specified voting place. [Problem-C]: Since each staff at the voting place compares manually the name of the admission ticket to the thick list of voters, a voter may sometimes have a long waiting time. [Problem-D]: Since the number of voters is very large, the cost for printing and mailing the voting admission tickets is huge in each election. 3.2 The Electronic Voting Admission We propose the electronic voting admission by using a cell phone that coexists with the current voting admission ticket by postal mail. (1) Overview If a voter wishes to receive an electronic voting admission ticket with the cell phone, the voter registers the address to the election administration committee of the national or local government depending on the kind of election in advance. The server transmits the basic text data for voting (voting kind, voting date, voting place, voter s name), the simple map of the voting place, and the twodimensional symbol that includes the detailed text data for voting (voter s name, address, voting place, and the message authentication code (or digital signature)), to the cell phone of the voter. The voter shows the two-dimensional symbol displayed on the cell phone to the staff at the voting place. The terminal computer reads the two-dimensional symbol displayed on the cell phone from the two-dimensional symbol scanner, and checks the correctness of the voter based on the data obtained from the two-dimensional symbol and the pre-downloaded data from the server. Since the check of the facial photograph of each voter is not performed at the present election, the check of each face image is the optional function. The displayed text data of the voter on the cell phone are minimized such as the voter s name and the voting place, and the detailed voter s text data are encrypted and stored in the two-dimensional The display of the electronic voting admission ticket of the voter s cell phone is shown in Fig. 2. The feature of the electronic voting admission ticket is shown in Table 3. This table compares the basic personal identification method described in section 2 to the electronic voting admission. The basic text data of the voter. The map of the voting place. Two-dimensional symbol including the voter s data. Fig. 2: The electronic voting admission ticket.

5 Table 3: The feature of the electronic admission ticket. Methods The basic personal The electronic identification voting admission. Items method. Off-line Possible. Possible. identification. On-line Possible. identification. Identification by face image. The data included in the to the cell phone. The data stored in the twodimensional The downloading scheme from the server to the terminal. The download data from the server to the terminal of the voting place. Possible. The basic text data for personal identification, and the twodimensional The basic text data for identification, the detailed text data for identification, and the highly compressed face image. Real-time download or pre-download. The basic text data for identification, the detailed text data for identification, and the ordinary compressed face image. Option. The basic text data for the voting admission, the simple map of the voting place, and the two-dimensional The basic text data for the voting admission, the detailed text data for the voting admission, and the data of the voting place. Pre-download. The list of voters for each voting place. Accordingly, the problem-a is resolved by storing the for the electronic admission in the cell phone. The problem-b is resolved by describing only one place in the map of the voting place. The problem-c is resolved by storing the list of voters in the terminal computer, and by checking the correspondence between the data of the voting admission ticket and the list of voters in the terminal computer. The concept of the electronic voting admission is shown in Fig. 3. Server of the election administration committee. The list of voters. The data of the electronic voting admission. [Pre-download] List of voters. [Voting place] Terminal computer. Scanner. [ ] Fig. 3: The concept of the electronic voting admission. (2) The Security The attacks and countermeasures against the voting admission schemes are shown in Table 4. Table 4: Attacks and countermeasures against the voting admission. Methods The electronic voting admission by using a cell phone. Attacks or errors The erratic delivery. The attacker steals the voting admission ticket. The attacker votes more than one time. The attacker gives a true or fake voting admission ticket to the other person. The address should be managed precisely. This case does not occur. This case can be detected at the voting place. The other person can vote when the personal identification at the voting place is incomplete. (The face check is desirable.) The basic data for voting. Simple map. Two-dimensional Voter s cell phone. The present voting admission by postal mail. The erratic delivery may occur because of the mailman s mistake. The attacker may steal the voting admission ticket from the mailbox. This case can be detected at the voting place. The other person can vote when the personal identification at the voting place is incomplete. (The face check is desirable.)

6 (3) Cost In order to investigate the Problem-D, let us discuss about the cost for the voting admission. The comparison of the voting admission tickets is shown in Table 5. Table 5: The comparison of voting admission tickets. Methods Items The electronic voting admission by using the cell phone. The voting admission by postal mail. The server for the voting management. To print the voting admission tickets. To distribute the voting admission tickets. The terminal computer for checking each voter in each voting place. The number of staff to check the voting admission ticket. The voter s payment for the voting admission. The time and transportation expenses for the voter. . Relatively small. A little payment occurs when the voter receives the . Postal mail. Relatively large. According to the election administration committee in the certain large city in Japan,, the expense of the voting admission tickets for the national election of the House of Councilors in July 2004 is as follows. The total printing cost for voting admission tickets is about JPY 4,700,000 (about US$ 47,000, when US$ 1.00 is assumed to be JPY 100 (Japanese yen)). The total mailing cost for voting admission tickets is about JPY 21,500,000 (about US$ 215,000). The number of voters in the day of election is 840,947. (The number of households is 435,795 in the data of November 2004.) Therefore, we obtain the following result. The printing and mailing cost of the current voting admission ticket per voter = (4,700,000+21,500,000) / 840,947 (JPY / voter) (JPY / voter) (US$ / voter). Although the cost depends on each election region, it is appropriate to refer the result because the city is a typical big city in Japan. Let us consider the effect for all over Japan. According to the data of the Ministry of Internal Affairs and Communications, the population of Japan in the year of 2000 is about 126,140,000 and the total number of voters (20 or more years old) is about 100,910,000. Therefore, when all voters use the electronic voting admission tickets, the decreasing cost for one election = 100,910,000 (voters) (JPY / voter) = JPY 3,143,851,050 US$ 31,438,510. As for the electronic voting admission, the printing cost and the postal mail cost are zero. Therefore, the total cost for voting admission becomes remarkably decreases when the number of voters that use the electronic voting admission increases. The increasing cost is discussed as follows. The data consists of the small text data, the small linedrawing map and the two-dimensional When the optional face image is used for authentication, it can be downloaded from the server. Therefore, the amount of data of the electronic voting admission ticket that are transmitted from the server to the cell phone is small. For example, the amount of data of the electronic voting admission transmitted from the server to the cell phone is calculated as follows based on the prototype. The detailed text data of the voting admission such as the voter name, the voter address, the voter s birth date, and the voting place are 61 bytes, the size of the map is 526 bytes and the size of the twodimensional symbol is 550 bytes, the total data amount is 1,137 bytes, and these data needs 8.8 packets. The payment for 8.8 packets is very small although it depends on each cellular phone company, (e.g., about JPY 1.0 (about US$ 0.01) for a cellular company). 4 CONCLUSION An electronic ID system for personal identification using a cell phone has been proposed. The two-dimensional symbol scanner can quickly read the electronic ID data, and the security of the electronic ID data is improved. The mechanism of the proposed personal identification method can be applied to the electronic voting admission for improving the services and decreasing the cost of the present voting admission in the election of national or local governments. REFERENCES [1] [2] B. Schneier, Applied cryptography, Second Edition, John Willey & Sons, Inc., (1996). [3] J. Kim and T. Kobayashi: Personal identification using a cell phone and the security, Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS2005), pp , IEICE, Japan, (Jan. 2004),. [4] N. Machida, J. Kim, and T. Kobayashi: An Electronic ID System using a Cell Phone and Its Evaluation, Proceedings of the Second IASTED International Conference on Communication, and Computer Networks (CCN2004), USA, IASTED, ACTA press, pp , (Nov. 2004). [5]

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India

More information

Authentication Technologies

Authentication Technologies Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something

More information

Security Technologies for Dynamic Collaboration

Security Technologies for Dynamic Collaboration Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi

More information

Privacy Policy. Implemented on: November 2, 2017

Privacy Policy. Implemented on: November 2, 2017 Implemented on: November 2, 2017 Privacy Policy STH JAPAN K.K. (the "Company") will strictly control any personal information received from you (the "User(s)") via the website https://hospitality.rugbyworldcup.com/

More information

E-Voting System based on Mobile using NIC and SIM

E-Voting System based on Mobile using NIC and SIM E-Voting System based on Mobile using NIC and SIM Balaji Ghate Satish Talewar Sanket Taware J. V. Katti college of Engg. ABSTRACT Mobile is emerging technology and center of attraction for worldwide end-user.

More information

Crypto meets Web Security: Certificates and SSL/TLS

Crypto meets Web Security: Certificates and SSL/TLS CSE 484 / CSE M 584: Computer Security and Privacy Crypto meets Web Security: Certificates and SSL/TLS Spring 2016 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann,

More information

BCA III Network security and Cryptography Examination-2016 Model Paper 1

BCA III Network security and Cryptography Examination-2016 Model Paper 1 Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct

More information

Application for anonymous registration. How do I register as an anonymous elector? Returning the form. More information

Application for anonymous registration. How do I register as an anonymous elector? Returning the form. More information Application for anonymous registration You need to be on the electoral register to vote in elections and referendums. If the safety of you (or someone in your household) would be at risk if your name or

More information

NexStamp. Frequently Asked Questions. (click anywhere to continue) Trusted Digital Originals TM

NexStamp. Frequently Asked Questions. (click anywhere to continue) Trusted Digital Originals TM NexStamp Trusted Digital Originals TM Frequently sked Questions (click anywhere to continue) What is a digital signature? 3 Can digital signatures appear on their corresponding documents? 4 Can a digital

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Secure Sockets Layer (SSL) / Transport Layer Security (TLS)

Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Brad Karp UCL Computer Science CS GZ03 / M030 20 th November 2017 What Problems Do SSL/TLS Solve? Two parties, client and server, not previously

More information

GUIDELINES FOR ONLINE APPLICANTS

GUIDELINES FOR ONLINE APPLICANTS Amrita Entrance Examination Engineering 2017 GUIDELINES FOR ONLINE APPLICANTS B.Tech. PROGRAMMES Amrita B.Tech aspirants can register for the 2017 Amrita Entrance Examination - Engineering in a few simple

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

Threat Assessment Summary. e-voting, Admin, and pvoting TOE s

Threat Assessment Summary. e-voting, Admin, and pvoting TOE s Threat Assessment Summary e-voting, Admin, and pvoting TOE s, 2011 Page 1 of 22 Source Code, High Level Architecture Documentation and Common Criteria Documentation Copyright (C) 2010-2011 and ownership

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

PRODUCT AUTHENTICATION USING QR-CODE THROUGH CLOUD

PRODUCT AUTHENTICATION USING QR-CODE THROUGH CLOUD PRODUCT AUTHENTICATION USING QR-CODE THROUGH CLOUD Prof. Sagar Thakare Assistant Professor, ABSTRACT Mr. Vighnesh Gadekar Mr. Mandar Gharat The development of a new product or technology always comes with

More information

E-commerce security: SSL/TLS, SET and others. 4.1

E-commerce security: SSL/TLS, SET and others. 4.1 E-commerce security: SSL/TLS, SET and others. 4.1 1 Electronic payment systems Purpose: facilitate the safe and secure transfer of monetary value electronically between multiple parties Participating parties:

More information

DEVELOPMENT AND EVALUATION OF A SYSTEM FOR CHECKING FOR IMPROPER SENDING OF PERSONAL INFORMATION IN ENCRYPTED

DEVELOPMENT AND EVALUATION OF A SYSTEM FOR CHECKING FOR IMPROPER SENDING OF PERSONAL INFORMATION IN ENCRYPTED DEVELOPMENT AND EVALUATION OF A SYSTEM FOR CHECKING FOR IMPROPER SENDING OF PERSONAL INFORMATION IN ENCRYPTED E-MAIL Kenji Yasu 1, Yasuhiko Akahane 2, Masami Ozaki 1, Koji Semoto 1, Ryoichi Sasaki 1 1

More information

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010 Cryptography Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

OneID An architectural overview

OneID An architectural overview OneID An architectural overview Jim Fenton November 1, 2012 Introduction OneID is an identity management technology that takes a fresh look at the way that users authenticate and manage their identities

More information

Implementing Security in QR Codes by using Blowfish Algorithm

Implementing Security in QR Codes by using Blowfish Algorithm Implementing Security in QR Codes by using Blowfish Algorithm Harpreet Sandhu 2, Kamesh Dubey 2 1 (Dept of Computer Science, CT Institute of Technology & Research, Jalandhar, Punjab, India) 2 (Dept of

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Radius, LDAP, Radius, Kerberos used in Authenticating Users CSCD 303 Lecture 5 Fall 2018 Radius, LDAP, Radius, Kerberos used in Authenticating Users Kerberos Authentication and Authorization Previously Said that identification, authentication and authorization

More information

Abstract. 1. Introduction

Abstract. 1. Introduction Supporting Signatures in Mobile Environments Scott Campbell Department of Computer Science and Systems Analysis, Miami University scott@cc-campbell.com Abstract s, like physical s, can verify that a specific

More information

Security & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of

Security & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of Contents Security & Privacy Contents Web Architecture and Information Management [./] Spring 2009 INFO 190-02 (CCN 42509) Erik Wilde, UC Berkeley School of Information Abstract 1 Security Concepts Identification

More information

Amrita Entrance Examination Engineering 2016

Amrita Entrance Examination Engineering 2016 Amrita Entrance Examination Engineering 2016 GUIDELINES FOR THE B-TECH PROGRAMME APPLICANTS Amrita B.Tech aspirants can register for the 2016 Amrita Entrance Examination - Engineering in a few simple steps.

More information

Implementation of Aadhaar Based EVM

Implementation of Aadhaar Based EVM Implementation of Aadhaar Based EVM Kiran Chavan 1, Kashinath Raut 2, Ashish Bhingardive 3, Yogesh Kolape 4, D. M. Ujalambkar 5 1, 2, 3, 4, 5 Computer Department, Savitribai Phule Pune University Abstract:

More information

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads Cryptography p y Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

2 Electronic Passports and Identity Cards

2 Electronic Passports and Identity Cards 2 Picture source: www.bundesdruckerei.de Paper based Passport Radio Frequency (RF) Chip Electronic Passport (E Pass) Biographic data Human readable Partially machine readable (optically) Conventional

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Biometric information protection

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Biometric information protection INTERNATIONAL STANDARD ISO/IEC 24745 First edition 2011-06-15 Information technology Security techniques Biometric information protection Technologies de l'information Techniques de sécurité Protection

More information

Implementation of Security in Cloud Systems Based using Encryption and Steganography

Implementation of Security in Cloud Systems Based using Encryption and Steganography Implementation of Security in Cloud Systems Based using Encryption and Steganography 1 A.Mahesh Babu, 2 G.A. Ramachandra, 3 M.Suresh Babu 1,2 Department of Computer Science & Technology, Sri Krishnadevaraya

More information

BIOMETRIC BASED VOTING MACHINE

BIOMETRIC BASED VOTING MACHINE Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 4, April-2018 BIOMETRIC BASED VOTING MACHINE

More information

903i Application Functions

903i Application Functions NTT DoCoMo Technical Journal Vol. 8 No.4 903i Application Functions Junko Hiraishi, Ema Tohriyama, Eiji Yano and Yoshimasa Nishimura The FOMA 903i Series supports a number of new application functions,

More information

Quick Guide for Mynaportal

Quick Guide for Mynaportal Quick Guide for Mynaportal Introduction of Mynaportal and About This Guide Mynaportal is an online service managed by the government of Japan. You can apply to services online related to parenting by the

More information

VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES

VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES PLEASE READ THIS PRIVACY POLICY CAREFULLY BEFORE USING THIS SITE. Last Updated: January 01, 2015 Direct Vet Marketing, Inc. (hereinafter,

More information

Automotive Security An Overview of Standardization in AUTOSAR

Automotive Security An Overview of Standardization in AUTOSAR Automotive Security An Overview of Standardization in AUTOSAR Dr. Marcel Wille 31. VDI/VW-Gemeinschaftstagung Automotive Security 21. Oktober 2015, Wolfsburg Hackers take over steering from smart car driver

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

REQUIREMENTS, DESIGN AND IMPLEMENTATION OF AN E-VOTING SYSTEM

REQUIREMENTS, DESIGN AND IMPLEMENTATION OF AN E-VOTING SYSTEM REQUIREMENTS, DESIGN AND IMPLEMENTATION OF AN E-VOTING SYSTEM Ghassan Z. Qadah American University of Sharjah United Arab Emerites ABSTRACT The rapid advancement in database, web and wireless technologies

More information

ISO/IEC Information technology Automatic identification and data capture techniques Bar code scanner and decoder performance testing

ISO/IEC Information technology Automatic identification and data capture techniques Bar code scanner and decoder performance testing INTERNATIONAL STANDARD ISO/IEC 15423 First edition 2004-06-15 Information technology Automatic identification and data capture techniques Bar code scanner and decoder performance testing Technologies de

More information

ETSI TS V6.1.0 ( )

ETSI TS V6.1.0 ( ) TS 102 224 V6.1.0 (2004-12) Technical Specification Smart cards; Security mechanisms for UICC based Applications - Functional requirements (Release 6) 2 TS 102 224 V6.1.0 (2004-12) Reference RTS/SCP-R0282r1

More information

Express Order Entry Neighbourhood Mail Generic Solution

Express Order Entry Neighbourhood Mail Generic Solution Express Order Entry Neighbourhood Mail Generic Solution Table of Contents (revised Jan./2018) 1.0 Introduction...3 About Express Order Entry: Neighbourhood Mail Generic Solution... 3 Login to the Express

More information

Alberta Municipal Elections Guide for Returning Officers

Alberta Municipal Elections Guide for Returning Officers Alberta Municipal Elections Guide for Returning Officers Every four years, on the third Monday in October, Alberta residents have the opportunity to elect their municipal representatives. Many aspects

More information

An efficient access control method for composite multimedia content

An efficient access control method for composite multimedia content IEICE Electronics Express, Vol.7, o.0, 534 538 An efficient access control method for composite multimedia content Shoko Imaizumi,a), Masaaki Fujiyoshi,andHitoshiKiya Industrial Research Institute of iigata

More information

Section 6. Registering a New Voter 5/11/2018

Section 6. Registering a New Voter 5/11/2018 57 Section 6 Registering a New Voter Registering a New Voter 58 When a voter cannot be found after numerous voter search attempts, the voter must complete a Colorado Voter Registration Form to register

More information

AirSIMS Visuals Draft Presentation

AirSIMS Visuals Draft Presentation AirSIMS Visuals Draft Presentation Felix Keng Fong Cheong Kelly Jung Scott Moura Wai Leung William Wong November 16, 2005 A System of Systems Population Movement Infectious Diseases AirSIMS Structural-Health

More information

ASSEMBLY ELECTION 2018 Karnataka

ASSEMBLY ELECTION 2018 Karnataka ASSEMBLY ELECTION 2018 Karnataka Ver 1.2 Information and Link as on Prepared by : NIJU ABRAHAM, PSA & ADIO, NIC, KARWAR UNDER THE GUIDANCE OF DEO, UTTARA KANNADA, KARNATAKA e-postal Ballot 1 Service Voters'

More information

SSL/TLS. How to send your credit card number securely over the internet

SSL/TLS. How to send your credit card number securely over the internet SSL/TLS How to send your credit card number securely over the internet The security provided by SSL SSL is implemented at level 4 The transport control layer In practice, SSL uses TCP sockets The underlying

More information

ETSI TS V8.0.0 ( )

ETSI TS V8.0.0 ( ) TS 101 180 V8.0.0 (2000-05) Technical Specification Digital cellular telecommunications system (Phase 2+); Security mechanisms for the SIM Application Toolkit; Stage 1 (GSM 02.48 version 8.0.0 Release

More information

Systems Analysis and Design in a Changing World, Fourth Edition

Systems Analysis and Design in a Changing World, Fourth Edition Systems Analysis and Design in a Changing World, Fourth Edition Learning Objectives Discuss examples of system interfaces found in information systems Define system inputs and outputs based on the requirements

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice

More information

But where'd that extra "s" come from, and what does it mean?

But where'd that extra s come from, and what does it mean? SSL/TLS While browsing Internet, some URLs start with "http://" while others start with "https://"? Perhaps the extra "s" when browsing websites that require giving over sensitive information, like paying

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

HF Markets SA (Pty) Ltd Protection of Personal Information Policy Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and

More information

Cost Minimization by QR Code Compression

Cost Minimization by QR Code Compression Cost Minimization by QR Code Compression Sharu Goel #1, Ajay Kumar Singh *2 #1 M. Tech Student & CSE Deptt., Meerut Institute of Engineering and Technology, Baghpat Bypass Road, NH- 58, Meerut, UPTU, (India)

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

GSCCCA Notary Online. User Manual

GSCCCA Notary Online. User Manual GSCCCA Notary Online User Manual Created By: Richard McPhaul Last Edited: November 2, 2009 History and Overview of Notary Online The Notary Online program is a voluntary program developed by the GSCCCA

More information

Elector8 Training and Instruction Document New Elector Wizard

Elector8 Training and Instruction Document New Elector Wizard Elector8 Training and Instruction Document New Elector Wizard Version Control Version No. Author Change Details Date 1.0.0 S Verdon Initial Version of Elector8 Manual October 2010 1.3.1 M Warner Review

More information

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of

More information

ELECTRIC APP - PRIVACY POLICY

ELECTRIC APP - PRIVACY POLICY By accessing the website at http://electricchats.com ( Electric Site ) or any Electric mobile application (e.g., Electric ios, or Electric Android,) ( Electric App ) (collectively, the Electric Service

More information

BCOCA Frequently Asked Questions. Implementation Tips for Producing Bar Codes with the Bar Code Object Content Architecture

BCOCA Frequently Asked Questions. Implementation Tips for Producing Bar Codes with the Bar Code Object Content Architecture AFP Color Consortium BCOCA Frequently Asked Questions Implementation Tips for Producing Bar Codes with the Bar Code Object Content Architecture Version 1.0 Page 1 of 11 Editor: David E. Stone, IBM Corporation

More information

QR Code as Private Key on El Gamal Algorithm

QR Code as Private Key on El Gamal Algorithm QR Code as Private Key on El Gamal Algorithm Ridho Akbarisanto - 13511005 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Bandung, Indonesia ridho.akbarisanto@yahoo.com Abstract

More information

An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature

An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature Puchong Subpratatsavee, Pramote Kuacharoen To cite this version: Puchong Subpratatsavee, Pramote Kuacharoen. An

More information

Replacement Certificate/ID Request Form. Use one form per course - all sections of the form must be completed unless otherwise stated.

Replacement Certificate/ID Request Form. Use one form per course - all sections of the form must be completed unless otherwise stated. Replacement Certificate/ID Request Form Use one form per course - all sections of the form must be completed unless otherwise stated. PLEASE WRITE CLEARLY IN BLOCK CAPITALS AND BLACK INK 1. Authorized

More information

XenApp 5 Security Standards and Deployment Scenarios

XenApp 5 Security Standards and Deployment Scenarios XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards

More information

NATIONAL REGISTRY OF CERTIFIED CHEMISTS 125 Rose Ann Lane, West Grove, PA (phone) / (fax) /

NATIONAL REGISTRY OF CERTIFIED CHEMISTS 125 Rose Ann Lane, West Grove, PA (phone) / (fax) / NATIONAL REGISTRY OF CERTIFIED CHEMISTS 125 Rose Ann Lane, West Grove, PA 19390 610-322-0657 (phone) / 800-858-6273 (fax) / rphifer@nrcc6.org (email) 1 APPLICATION FOR CERTIFICATION AS A TOXICOLOGICAL

More information

Human-Machine Identification Using Visual Cryptography

Human-Machine Identification Using Visual Cryptography Human-Machine Identification Using isual Cryptography Mi-Ra Kim* Ji-Hwan Park* Yuliang Zheng** * Dept of Computer Science, PuKyong National University, 599- Daeyeon-Dong, Nam-Ku, Pusan 608-737, Korea {kimmr,jhpark}@unicornpknuackr

More information

Federal Voting Assistance Program (FVAP)

Federal Voting Assistance Program (FVAP) 16th Annual Computer Security Application Conference (ACSAC) December 2000 Federal Voting Assistance Program (FVAP) Provide Background on VOI Pilot Effort Provide High Level Technical Overview Security

More information

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional

More information

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski Operating Systems Design Exam 3 Review: Spring 2012 Paul Krzyzanowski pxk@cs.rutgers.edu 1 Question 1 An Ethernet device driver implements the: (a) Data Link layer. (b) Network layer. (c) Transport layer.

More information

SYSTEM AND METHOD FOR FACILITATING SECURE TRANSACTIONS

SYSTEM AND METHOD FOR FACILITATING SECURE TRANSACTIONS FCOOK.001PR PATENT SYSTEM AND METHOD FOR FACILITATING SECURE TRANSACTIONS BRIEF DESCRIPTION OF THE DRAWINGS [0001] Embodiments of various inventive features will now be described with reference to the

More information

Outgoing Ltd Official Ticketing Agent Terms and Conditions

Outgoing Ltd Official Ticketing Agent Terms and Conditions Outgoing Ltd Official Ticketing Agent Terms and Conditions In these terms and conditions "Outgoing" refers to Outgoing Ltd. Outgoing sells all tickets as an agent on behalf of the organisers and Outgoing

More information

Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition

Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition 1 Soshi Hamaguchi, 1 Toshiyuki Kinoshita, 2 Satoru Tezuka 1 Tokyo University of Technology, Tokyo, Japan,

More information

Flexepin Cash Topup Vouchers. API based Business UAT

Flexepin Cash Topup Vouchers. API based Business UAT Flexepin Cash Topup Vouchers API based Business UAT Document History Revision Description of Change Date Author 1.0 UAT Flexepin API 10-Nov-15 GB 1.1 Minor rewording 05 Jan 2016 ED 1.2 Amended test cases

More information

PAYMENT FORM. Name of Cardholder: Service Selected: (please select one below) Signature: Domestic

PAYMENT FORM. Name of Cardholder: Service Selected: (please select one below) Signature: Domestic Mail forwarding services can be a critical component of the successful operation of any business. For your convenience we are offering two (2) mail forwarding options. You may select the option that best

More information

Mobile verification. If your Mobile Number is correct, click Get Code.

Mobile verification. If your Mobile Number is correct, click Get Code. KYC Process To complete your KYC (Know Your Customer) verification, please login to your Back Office. Navigate to Support KYC- Status and the following submenus (as stated on top of every section) to perform

More information

Certificate-based authentication for data security

Certificate-based authentication for data security Technical white paper Certificate-based authentication for data security Table of Contents Introduction... 2 Analogy: A simple checking account... 2 Verifying a digital certificate... 2 Summary... 8 Important

More information

ELECTRONIC POLL BOOK INSTRUCTIONS

ELECTRONIC POLL BOOK INSTRUCTIONS ELECTRONIC POLL BOOK INSTRUCTIONS Clerk s Office Rochester Hills 1000 Rochester Hills Dr. Rochester Hills, MI 48309 www.rochesterhills.org Phone: 248.656.4630 Fax: 248.656.4744 Rev. 10/2017 Table of Contents

More information

Unless otherwise indicated additions are shown in blue, deletions in red strikethrough, and comments in green.

Unless otherwise indicated additions are shown in blue, deletions in red strikethrough, and comments in green. ENDL TEXAS Date: 17 January 2008 To: T10 Technical Committee From: Ralph O. Weber Subject: SA Creation corrections and clarifications Introduction Revision History r0 r1 r2 r3 Initial revision Insert correct

More information

CS3235 Seventh set of lecture slides

CS3235 Seventh set of lecture slides CS3235 Seventh set of lecture slides Hugh Anderson National University of Singapore School of Computing October, 2007 Hugh Anderson CS3235 Seventh set of lecture slides 1 Warp 9... Outline 1 Public Key

More information

INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD

INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD Jeffy Mwakalinga, Prof Louise Yngström Department of Computer and System Sciences Royal Institute of Technology / Stockholm University

More information

Cryptology Part 1. Terminology. Basic Approaches to Cryptography. Basic Approaches to Cryptography: (1) Transposition (continued)

Cryptology Part 1. Terminology. Basic Approaches to Cryptography. Basic Approaches to Cryptography: (1) Transposition (continued) Cryptology Part 1 Uses of Cryptology 1. Transmission of a message with assurance that the contents will be known only by sender and recipient a) Steganography: existence of the message is hidden b) Cryptography:

More information

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment. CS355: Cryptography Lecture 17: X509. PGP. Authentication protocols. Key establishment. Public Keys and Trust Public Key:P A Secret key: S A Public Key:P B Secret key: S B How are public keys stored How

More information

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries

More information

What information do we collect online and how is it used?

What information do we collect online and how is it used? Thirty-One Gifts LLC - Privacy Policy This Privacy Policy is intended to assist you in understanding what personal information we gather about you when you visit Thirty-One Gifts online, how we use and

More information

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION

More information

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données INTERNATIONAL STANDARD ISO 15764 First edition 2004-08-15 Road vehicles Extended data link security Véhicules routiers Sécurité étendue de liaison de données Reference number ISO 15764:2004(E) ISO 2004

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 9: Vascular image data

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 9: Vascular image data INTERNATIONAL STANDARD ISO/IEC 19794-9 First edition 2007-03-01 Information technology Biometric data interchange formats Part 9: Vascular image data Technologies de l'information Formats d'échange de

More information

CCST Examination Application

CCST Examination Application 1. APPLICANT INFORMATION (Please print or type.) Prefix: Mr. Mrs. Ms. Miss Other Last name First name MI (you must provide your name as it appears on your photo identification) Membership IBEW UA Member

More information

Privacy Statement of Taiwan Cooperative Bank

Privacy Statement of Taiwan Cooperative Bank Privacy Statement of Taiwan Cooperative Bank Your privacy is important to us. At Taiwan Cooperative Bank we recognize the importance of personal information entrusted to us. It is one of our fundamental

More information

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY Volume 119 No. 15 2018, 1557-1564 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY S. EsaiPuvanesh

More information

A Hybrid Touch Interface for Prêt àvoter. Chris Culnane, University of Surrey Trustworthy Voting Systems Project

A Hybrid Touch Interface for Prêt àvoter. Chris Culnane, University of Surrey Trustworthy Voting Systems Project A Hybrid Touch Interface for Prêt àvoter Chris Culnane, University of Surrey Trustworthy Voting Systems Project Overview Brief Introduction to Prêt àvoter Motivation Hybrid Touch Concept Implementation

More information

Implementation of Secure Payment Transaction using AES encryption with extended Visual Cryptography

Implementation of Secure Payment Transaction using AES encryption with extended Visual Cryptography Implementation of Secure Payment Transaction using AES encryption with extended Visual Cryptography GRADUATE PROJECT REPORT Submitted to the Faculty of the Department of Computing Sciences Texas A&M University-Corpus

More information

Countermeasures against Mobile spam

Countermeasures against Mobile spam 8 July, 2004 Countermeasures against Mobile spam ~ Legislation and Self-regulation ~ Toshihiko SHIBUYA, Deputy Director Telecommunications Consumer Policy Division, Telecommunications Bureau, Ministry

More information

Ministry of Government and Consumer Services. ServiceOntario. Figure 1: Summary Status of Actions Recommended in June 2016 Committee Report

Ministry of Government and Consumer Services. ServiceOntario. Figure 1: Summary Status of Actions Recommended in June 2016 Committee Report Chapter 3 Section 3.06 Ministry of Government and Consumer Services ServiceOntario Standing Committee on Public Accounts Follow-Up on Section 4.09, 2015 Annual Report In March 2016, the Committee held

More information

Certification Report

Certification Report Certification Report Koji Nishigaki, Chairman Information-technology Promotion Agency, Japan Target of Evaluation Application date/id 2008-02-12 (ITC-8195) Certification No. C0189 Sponsor Panasonic Communications

More information

USER MANUAL FOR ONLINE SUBMISSION OF APPLICATION FORM FOR NEET PG 2019

USER MANUAL FOR ONLINE SUBMISSION OF APPLICATION FORM FOR NEET PG 2019 USER MANUAL FOR ONLINE SUBMISSION OF APPLICATION FORM FOR NEET PG 2019 Overview You can submit your application form for NEET PG from the NBE website www.nbe.edu.in from November 2 nd 2018 to November

More information

PERSONAL ACCOUNT-HOLDER

PERSONAL ACCOUNT-HOLDER User Guide PERSONAL ACCOUNT-HOLDER How To Register & Verify Your Free Paxum Personal Account How To Register Your Free Paxum Personal Account Paxum accepts new accounts from individuals and businesses

More information