Resilient Identity Crime Detection

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Review on Data Mining Methods for Identity Crime Detection

Identity Crime is well known, established, and costly. Identity Crime is the term used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain. Forgery and use of fraudulent identity documents are major enablers of Identity Fraud. It has affected the e-commerce. It is inc...

متن کامل

Crime Detection via Crowdsourcing

Abstract. In this paper we propose a novel yet simple scheme for criminal detection. Rather than tracking the criminal that committed a particular crime, the police will rank the houses suspected to host criminals according to patterns on citizens’ tips. We show that this strategy will provably identify the desired houses under reasonable assumptions. This will aid detectives decide where to fo...

متن کامل

Virtopsy Application in Crime Detection and its Comparison with Autopsy

Aim(s): Virtopsy is a modern technology that identifies the cause of death through radiology without dissection. In addition to reducing the detection time, this technology also has high diagnostic sensitivity in some cases. One of the aims of criminal law science is accurate and rapid criminology. The aim of this study was to investigate the application of virtopsy method in crime detection an...

متن کامل

Identity-Based Encryption Resilient to Continual Auxiliary Leakage

We devise the first identity-based encryption (IBE) that remains secure even when the adversary is equipped with auxiliary input (STOC ’09) – any computationally uninvertible function of the master secret key and the identity-based secret key. In particular, this is more general than the tolerance of Chow et al.’s IBE schemes (CCS ’10) and Lewko et al.’s IBE schemes (TCC ’11), in which the leak...

متن کامل

k-Resilient Identity-Based Encryption in the Standard Model

We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encryption scheme (IBE) based on the well studied Decisional Diffie-Hellman (DDH) assumption. The scheme is provably secure in the standard model assuming the adversary can corrupt up to a maximum of k users adaptively. This is contrary to the Boneh-Franklin scheme which holds in the random-oracle model.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Knowledge and Data Engineering

سال: 2012

ISSN: 1041-4347

DOI: 10.1109/tkde.2010.262