scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
01 Jan 2007
TL;DR: The approach is based on the ideas of compartmentalization for separating applications domains of different trust level, and a trusted wallet for storing credentials and authenticating sensitive services and requires no special care from users for identifying the right web sites while the disclosure of credentials is strictly controlled.
Abstract: Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal information. Various solutions have been proposed against this kind of attack. However, these solutions can hardly counter the new generation of sophisticated malware phishing attacks, e.g., pharming trojans, designed to target certain services. This paper aims at making the first steps towards the design and implementation of an open source and interoperable security architecture that prevents both classical and malware phishing attacks. Our approach is based on the ideas of compartmentalization for separating applications domains of different trust level, and a trusted wallet for storing credentials and authenticating sensitive services. Once the wallet has been setup in an initial step, our solution requires no special care from users for identifying the right web sites while the disclosure of credentials is strictly controlled. Moreover, a prototype of the basic platform exists and we briefly describe its implementation.

2 citations

Book ChapterDOI
01 Jan 2015
TL;DR: The purpose of this chapter is to present a comprehensive approach to the problem of privacy protection in healthcare social networks, to summarize threats and suggest emerging technological solutions to protect users.
Abstract: The purpose of this chapter is to present a comprehensive approach to the problem of privacy protection in healthcare social networks, to summarize threats and suggest emerging technological solutions to protect users. For this purpose we start with a definition of the term “privacy” and how it evolved through time. We continue within the context of social networks and highlight the main privacy issues and threats for network members. In addition, we analyze the Common Criteria for IT security evaluation that apply to privacy, under the prism of Healthcare Social Networks (HSNs) and present tools and methods that may enhance privacy in such networks. Finally, we provide examples of popular HSNs, categorized according to the purpose they serve and discuss the privacy challenges for them.

2 citations

Proceedings ArticleDOI
15 Nov 2013
TL;DR: A realtime authentication approach based on mouse-hidden scene to detect identify theft attack and can achieve 2.6 percent of FAR and 3.3 percent of FRR while authentication time consumed is acceptable in practice.
Abstract: Identity theft, as a common insider attack method, is difficult to detect because it is hard to distinguish the legal user from the masquerader with a stolen legal identity. Compared with traditional identity authentication method such as password or fingerprint, behavior biometrics based on HCI (Human-Computer Interaction) has been more useful and effective in real-time authentication. However, existed approaches either require longer authentication time or are designed for special scenario. In this paper, we propose a realtime authentication approach based on mouse-hidden scene to detect identify theft attack. When operations of the suspicious masquerader are detected, the cursor is hidden deliberately. Under the scene, we assume that mouse operators become anxious and show some unique and instinct mouse movement operations. Based on the movement traces, behavioral model is generated and used for detecting the suspicious masquerader. The experiments show the approach can achieve 2.6 percent of FAR and 3.3 percent of FRR while authentication time consumed is acceptable in practice.

2 citations

Patent
25 Jun 2012
TL;DR: In this article, a method of creating a database for identity theft protection authentication, which includes receiving in a verification controller a first identifying information identifying a first identity card issued by a first card organization to authenticate a first transaction, was described.
Abstract: A method of creating a database for identity theft protection authentication, includes receiving in a verification controller a first identifying information identifying a first identity card issued by a first card organization to authenticate a first transaction (block 502), receiving in the verification controller a first biometric data scanned from a user of the first identity card (block 504), using the first identifying information as a key (block 510) to verify a record for the first identity card does not exist in an existing database (block 517) that is in communication with the verification controller, and adding in the existing database at least one record associating the first identifying information and the first biometric data, (blocks 518, 520), the first biometric data then referred to as pre-existing first biometric data.

2 citations

Proceedings ArticleDOI
02 Jul 2013
TL;DR: A historical background on the evolution of fingerprint technology is provided and the salient feature such system should possess to meet the contemporary technical challenges are detailed.
Abstract: Fingerprint based identification is becoming increasingly useful and cost effective now a days to tackle growing trend of identity theft, repeat offenses, authentication frauds, medical malpractices, and unlawful access & permissions. This paper provides a historical background on the evolution of fingerprint technology and detailed the salient feature such system should possess to meet the contemporary technical challenges. This work also presents the industry landscape of commercial and non-commercial biometrics market and a selected list of its various applications. The paper conclude with a demonstration of building an open-source AFIS from scratch and the required phases and research work needed to build such a solution.

2 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112