scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Proceedings ArticleDOI
07 Jul 2013
TL;DR: A pseudonym-based identification scheme that assures security and revocation of identities protecting identity data through advanced cryptography is proposed that helps to achieve the privacy desired by nodes and the traceability required by law enforcement.
Abstract: In Vehicular Ad-hoc Networks (VANETs), node authentication is an inherent problem since nodes enter and leave the network freely. In wireless networks, the management of identities becomes important because of the propagation medium, where problems such as the loss of node's privacy, the disclosure of personal information, and particularly identity theft and impersonation should be avoided. This paper proposes a pseudonym-based identification scheme that assures security and revocation of identities protecting identity data through advanced cryptography. The presented scheme is based on the generation of a pseudonym formed by node's real identity and an identifier assigned by a trusted third party (Identity Management Server, IMS) after an identification process. The IMS helps to achieve the privacy desired by nodes and the traceability required by law enforcement.

4 citations

01 Jan 2014
TL;DR: A new approach named as "An Efficient Anti phishing method based on Visual Cryptography using cloud technique by smart phones" to solve the problem of phishing.
Abstract: Phishing is nothing but an attempt made by an individual or group to thieve personal confidential information such as password, credit card information, Transaction Number etc. from unsuspecting victims for identity theft and fraudulent activities. Since the importance of smart phones is increased day to day as more applications are deployed and executed. In this paper, a new approach named as "An Efficient Anti phishing method based on Visual Cryptography using cloud technique by smart phones" to solve the problem of phishing. The visual cryptography is explored to preserve the privacy image Captcha by decomposing it into two shares that are stored in cloud (data severs) such that, when original Captcha can be revealed when the both are available at same time. Since users are unable to carry the Captcha place to place so a concept of Image Captcha conversion into String with the help of cloud is revealed which can be used as the password.

4 citations

Journal ArticleDOI
TL;DR: A metrics model based on distance metrics in order to quantify the credential identity attributes used in online services and activities can be used to uniquely identify an online identity claimant and help address the security challenge in identity management systems.
Abstract: Internet has brought a lot of security challenges on the interaction, activities, and transactions that occur online. These include pervasion of privacy of individuals, organizations, and other online actors. Relationships in real life get affected by online mischievous actors with intent to misrepresent or ruin the characters of innocent people, leading to damaged relationships. Proliferation of cybercrime has threatened the value and benefits of internet. Identity theft by fraudsters with intent to steal assets in real space or online has escalated. This study has developed a metrics model based on distance metrics in order to quantify the credential identity attributes used in online services and activities. This is to help address the digital identity challenges, bring confidence to online activities and ownership of assets. The application forms and identity tokens used in the various sectors to identify online users were used as the sources of the identity attributes in this paper. The corpus toolkits were used to mine and extract the identity attributes from the various forms of identity tokens. Term weighting schemes were used to compute the term weight of the identity attributes. Other methods used included Shannon Entropy and the Term Frequency-Inverse Document Frequency scheme (TF*IDF). Standardization of data using data normalization method has been applied. The results show that using the Cosine Similarity Measure, we can identify the identity attributes in any given identity token used to identify individuals and entities. This will help to attach the legitimate ownership to the digital identity attributes. The developed model can be used to uniquely identify an online identity claimant and help address the security challenge in identity management systems. The proposed model can also identify the key identity attributes that could be used to identify an entity in real or cyber spaces.

4 citations

Proceedings ArticleDOI
03 Mar 2014
TL;DR: This paper introduces protocols for securely deriving identities from a strong root identity into the SE inside the smartphone as well as for using the newly derived IDs, which do not require a trustworthy smartphone operating system or a Trusted Execution Environment.
Abstract: Identity theft has deep impacts in today's mobile ubiquitous environments. At the same time, digital identities are usually still protected by simple passwords or other insufficient security mechanisms. In this paper, we present the TrustID architecture and protocols to improve this situation. Our architecture utilizes a Secure Element (SE) to store multiple context-specific identities securely in a mobile device, e.g., a smartphone. We introduce protocols for securely deriving identities from a strong root identity into the SE inside the smartphone as well as for using the newly derived IDs. Both protocols do not require a trustworthy smartphone operating system or a Trusted Execution Environment. In order to achieve this, our concept includes a secure combined PIN entry mechanism for user authentication, which prevents attacks even on a malicious device. To show the feasibility of our approach, we implemented a prototype running on a Samsung Galaxy SIII smartphone utilizing a microSD card SE. The German identity card nPA is used as root identity to derive context-specific identities.

4 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112