Lavinia Mihaela Dinca

Learn More
Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would(More)
Increasing operational and security demands changed biometrics by shifting the focus from single to multi-biometrics. Multi-biometrics are mandatory in the current context of large international biometric databases and to accommodate new emerging security demands. Our paper is a comprehensive survey on multi-biometrics, covering two important topics related(More)
We propose a user-centric private key management framework that supports future personal sensing applications. This framework allows for a simple distributed private key system with embedded secure key storage and recovery in multiple parties. The user maintains control over implementation choices and the ability to consent to data being utilised or(More)
The current methods of communication using steganography techniques involve the use of carrier files including network protocols. The current study presents a new method of communication using steganography techniques available today, the carrier being a ping. The study will also present the most effective ways of prevention against this form of secret(More)
The Internet-of-Things relies on ad-hoc connections, which also requires an on-demand approach to the negotiation of security parameters. We propose a new approach to shared key derivation for Body Area Networks (BANs). Body area networks are quickly becoming increasingly important in the world of healthcare with wide application in the treatment and(More)
Random numbers generators are very important for cryptography and using biometrics as a source for randomness is on ascending trend. Because of the multitude of IoT devices present in our daily lives the need for keys and sources of randomness increased. This paper assesses the feasibility of using IoT devices to gather data on human behaviour for creating(More)
  • 1