Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Informatics - Papers (Archive)

2005

Based

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

Generic Construction Of (Identity-Based) Perfect Concurrent Signatures, Sherman S. M. Chow, Willy Susilo Jan 2005

Generic Construction Of (Identity-Based) Perfect Concurrent Signatures, Sherman S. M. Chow, Willy Susilo

Faculty of Informatics - Papers (Archive)

The notion of concurrent signatures was recently introduced by Chen, Kudla and Paterson. In concurrent signature schemes, two entities can produce two signatures that are not binding, until one of the parties releases an extra piece of information (namely the keystone). Subsequently, it was noted that the concurrent signature scheme proposed in the seminal paper cannot provide perfect ambiguity. Then, the notion of perfect concurrent signatures was introduced. In this paper, we define the notion of identity-based (or ID-based) perfect concurrent signature schemes. We provide the first generic construction of (ID-based) perfect concurrent signature schemes from ring signature schemes. …


Cancelable Key-Based Fingerprint Templates, Russell Ang, Reihaneh Safavi-Naini, Luke F. Mcaven Jan 2005

Cancelable Key-Based Fingerprint Templates, Russell Ang, Reihaneh Safavi-Naini, Luke F. Mcaven

Faculty of Informatics - Papers (Archive)

Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data will be permanent. Cancelable biometrics store a non-invertible transformed version of the biometric data and so if the storage is compromised the biometric data remains safe. Cancelable biometrics also provide a higher level of privacy by allowing many templates for the same biometric data and hence non-linkability of user's data stored in different databases. We define how to measure the success of a particular transformation and matching algorithm for fingerprints. We consider a key-dependent geometric …


Exploring End-User Perceptions Towards Mandated Deployment Of Pda-Based Health Information Systems Within Ambulatory Care, Jason P. Sargent, Lois Burgess, Joan Cooper, Carole Alcock, Damien Ryan Jan 2005

Exploring End-User Perceptions Towards Mandated Deployment Of Pda-Based Health Information Systems Within Ambulatory Care, Jason P. Sargent, Lois Burgess, Joan Cooper, Carole Alcock, Damien Ryan

Faculty of Informatics - Papers (Archive)

The impact of many well intentioned technology integration projects has not always been viewed favourably. In fact, many projects are destined to fail from the outset by not considering fundamental IT system inves tment risks (technical failure, data failure, user failure, organizational failure) [Lyytinen & Hirschiem, 1987]. With any new technology ‘an element of uncertainty exists in the minds of decision makers with respect to the successful adoption of them’ [Bagozzi et al, 1992]. Uncertainty towards adopting new technologies is not solely the domain of decision makers. Apart from chief technology and information officers, system administrators and help desk personnel, …