Resilient Identity Crime Detection
نویسندگان
چکیده
منابع مشابه
A Review on Data Mining Methods for Identity Crime Detection
Identity Crime is well known, established, and costly. Identity Crime is the term used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain. Forgery and use of fraudulent identity documents are major enablers of Identity Fraud. It has affected the e-commerce. It is inc...
متن کاملCrime Detection via Crowdsourcing
Abstract. In this paper we propose a novel yet simple scheme for criminal detection. Rather than tracking the criminal that committed a particular crime, the police will rank the houses suspected to host criminals according to patterns on citizens’ tips. We show that this strategy will provably identify the desired houses under reasonable assumptions. This will aid detectives decide where to fo...
متن کاملVirtopsy Application in Crime Detection and its Comparison with Autopsy
Aim(s): Virtopsy is a modern technology that identifies the cause of death through radiology without dissection. In addition to reducing the detection time, this technology also has high diagnostic sensitivity in some cases. One of the aims of criminal law science is accurate and rapid criminology. The aim of this study was to investigate the application of virtopsy method in crime detection an...
متن کاملIdentity-Based Encryption Resilient to Continual Auxiliary Leakage
We devise the first identity-based encryption (IBE) that remains secure even when the adversary is equipped with auxiliary input (STOC ’09) – any computationally uninvertible function of the master secret key and the identity-based secret key. In particular, this is more general than the tolerance of Chow et al.’s IBE schemes (CCS ’10) and Lewko et al.’s IBE schemes (TCC ’11), in which the leak...
متن کاملk-Resilient Identity-Based Encryption in the Standard Model
We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encryption scheme (IBE) based on the well studied Decisional Diffie-Hellman (DDH) assumption. The scheme is provably secure in the standard model assuming the adversary can corrupt up to a maximum of k users adaptively. This is contrary to the Boneh-Franklin scheme which holds in the random-oracle model.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Knowledge and Data Engineering
سال: 2012
ISSN: 1041-4347
DOI: 10.1109/tkde.2010.262