Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication

نویسندگان

  • Mauro Cislaghi
  • George Eleftherakis
  • Roberto Mazzilli
  • Francois Mohier
  • Sara Ferri
  • Valerio Giuffrida
  • Elisa Negroni
چکیده

This paper describes how “Computer supported cooperative work”, coped with security technologies and advanced knowledge management techniques, can support the penal judicial activities, in particular national and trans-national investigations phases when different judicial system have to cooperate together. Increase of illegal immigration, trafficking of drugs, weapons and human beings, and the advent of terrorism, made necessary a stronger judicial collaboration between States. J-WeB project (http://www.jweb-net.com/), financially supported by the European Union under the FP6 – Information Society Technologies Programme, is designing and developing an innovative judicial cooperation environment capable to enable an effective judicial cooperation during cross-border criminal investigations carried out between EU and Countries of enlarging Europe, having the Italian and Montenegrin Ministries of Justice as partners. In order to reach a higher security level, an additional biometric identification system is integrated in the security environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Palmprint and Iris based Authentication and Secure Key Exchange against Dictionary Attacks

The Multimodal Biometric based user authentication systems are highly secured and efficient to use and place total trust on the authentication server where biometric verification data are stored in a central database. Such systems are prone to dictionary attacks initiated at the server side. In this paper, we propose an efficient approach based on multimodal biometrics (Palmprint and Iris) base...

متن کامل

Finger Print Based Authentication and Key Exchange System Secure Against Dictionary Attack

The Biometric based user authentication systems are highly secured and efficient to use and place total trust on the authentication server where biometric verification data are stored in a central database. Such systems are, prone to dictionary attacks initiated at the server side. Compromise of the authentication server by either outsiders or insiders do all user private data to exposure and m...

متن کامل

A Modular Framework for Multi-Factor Authentication and Key Exchange

Multi-Factor Authentication (MFA), often coupled with Key Exchange (KE), offers very strong protection for secure communication and has been recommended by many major governmental and industrial bodies for use in highly sensitive applications. Over the past few years many companies started to offer various MFA services to their users and this trend is ongoing. The MFAKE protocol framework prese...

متن کامل

Securing the communication of medical information using local biometric authentication and commercial wireless links

Medical information is extremely sensitive in nature - a compromise, such as eavesdropping or tampering by a malicious third party, may result in identity theft, incorrect diagnosis and treatment, and even death. Therefore, it is important to secure the transfer of medical information from the patient to the recording system. We consider a portable, wireless device transferring medical informat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008