scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Proceedings Article
01 Jan 2007
TL;DR: This research explains how to cope with malicious code more efficiently by abstracting malicious function signature and hiding attribute and proposes sequencial hybrid analysis for API calls that are hooked inside user-mode and kernel-level of Windows.
Abstract: We have come a long way in the information age. Thanks to the advancement of such technologies as the internet, we have discovered new ways to convey information on a broader scope. However, negative aspects exist as is with anything else. These may include invasion of privacy over the web, or identity theft over the internet. What is more alarming is that malwares so called 'maliciouscodes' are rapidly spreading. Its intent is very destructive which can result in hacking, phishing and as aforementioned, one of the most disturbing problems on the net, invasion of privacy. This thesis describes the technology of how you can effectively analyze and detect these kind of malicious codes. We propose sequencial hybrid analysis for API calls that are hooked inside user-mode and kernel-level of Windows. This research explains how we can cope with malicious code more efficiently by abstracting malicious function signature and hiding attribute.

4 citations

Journal ArticleDOI
TL;DR: In this paper comparison of the paper with the existing system is done and how the method is more efficient is shown and also results are shown.
Abstract: Phishing is an attack by a group or an individual to misuse personal information such as passwords, credit card information etc. for identity theft, financial gain and other fraudulent activities. In this paper image based (QR codes) authentication using Visual Cryptography (VC) is used. Visual cryptography is explored to convert the QR code into two shares and both these shares can then be transmitted separately. One Time Passwords (OTP) is passwords which are valid only for a session to validate the user within a specified amount of time. In this paper we are doing comparison of our paper with the existing system and show how our method is more efficient and also show our results. General Terms Visual cryptography, Grayscale, Threshold algorithm.

4 citations

01 Jan 2011
TL;DR: A novel system which employs biometry to secure electronic transactions by using the dynamic signature as the single individual characteristic to be verified before the processing is made is proposed.
Abstract: Since the “explosion” of the number of on-line transactions, many IT researchers have concentrated their efforts to offer solutions to the security demanded by operations involving financial data. This paper proposes a novel system which employs biometry to secure electronic transactions by using the dynamic signature as the single individual characteristic to be verified before the processing is made. By attaching the signature to a payment instrument, a new security layer will be implemented being able to reject a percentage of identity theft attempts close to 100%. All verification requests will be processed at a dedicated processing node, signalling the response through secured customized interfaces.

4 citations

01 Jan 2002
TL;DR: In this paper, two kinds of international regulation models that can be taken into account are harmonization of laws and international standardization, and they have been offered such as self-regulation and government regulation.
Abstract: Elctronic Commerce (E-Commerce) has reformed the interaction between consumer and companies from a direct into an indirect type of interaction. In E-Comemerce, a consumer who engages in a business transaction such as pasport number or PIN (Personal Identification Number) Since internet is a public space, some consumers believe that E-Coinmerce is susceptible to privacy rights invasion. There are at least two general categories of privacy invasions, i.e. identity theft and illegal use of personal identification. To overcorne the problem, sorne alternative regulation models lrave been offered such as self-regulation and government regulation. However, because of several drawbacks of these rnodels and the fact that E-Commerce being transborder trade in nature, the establishment of an international regulation on the protection of privacy rights in E-Commerce is one of the rnost possible alternatives. Two kinds of international regulation models that can be taken into account are harmonisation of laws and international standardization.

4 citations

Posted Content
TL;DR: This paper criticizes the practice of using clear-text identity attributes, such as Social Security or driver's license numbers, as acceptable authentication tokens or assertions of ownership, and proposes a simple protocol that straightforwardly applies public-key cryptography to make identity claims verifiable, even when they are issued remotely via the Internet.
Abstract: Data security, which is concerned with the prevention of unauthorized access to computers, databases, and websites, helps protect digital privacy and ensure data integrity. It is extremely difficult, however, to make security watertight, and security breaches are not uncommon. The consequences of stolen credentials go well beyond the leakage of other types of information because they can further compromise other systems. This paper criticizes the practice of using clear-text identity attributes, such as Social Security or driver's license numbers -- which are in principle not even secret -- as acceptable authentication tokens or assertions of ownership, and proposes a simple protocol that straightforwardly applies public-key cryptography to make identity claims verifiable, even when they are issued remotely via the Internet. This protocol has the potential of elevating the business practices of credit providers, rental agencies, and other service companies that have hitherto exposed consumers to the risk of identity theft, to where identity theft becomes virtually impossible.

4 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112