Bonneau, 2005 - Google Patents
Identity Theft-Is It A Cryptographic Problem?Bonneau, 2005
View PDF- Document ID
- 17730045455495004233
- Author
- Bonneau P
- Publication year
External Links
Snippet
Identity theft occurs when a person uses the means of identification of another individual to commit criminal activity. Americans of all demographics are potential victims of this crime. After looking at the details of this problem, it is apparent that the growth of identity theft can …
- 230000000694 effects 0 abstract description 25
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Frank et al. | Approach to cyber security issues in Nigeria: challenges and solution | |
LoPucki | Human identification theory and the identity theft problem | |
Wang et al. | A contextual framework for combating identity theft | |
Smith | Identity theft and fraud | |
Makeri | Cyber security issues in Nigeria and challenges | |
Biegelman | Identity theft handbook: Detection, prevention, and security | |
Camp et al. | The economics of financial and medical identity theft | |
Ahmed | Preventing identity crime: identity theft and identity fraud: an identity crime model and legislative analysis with recommendations for preventing identity crime | |
Vacca | Identity theft | |
Archer et al. | Identity theft and fraud: Evaluating and managing risk | |
Camp | Economics of Identity Theft: Avoidance, Causes and Possible Cures | |
Vasiu et al. | Riders on the storm: An analysis of credit card fraud cases | |
Nirwan et al. | A Comprehensive Study Cyber Attacks and Countermeasures | |
Ahmed | Identity Crime Framework and Model: Five Components of Identity Crime and the Different Illegal Methods of Acquiring and Using Identity Information and Documents | |
Bonneau | Identity Theft-Is It A Cryptographic Problem? | |
Anifalaje | A legal approach to the protection of customers of banks and other financial institutions from identity theft in Nigeria | |
Hanel | Identity theft | |
Menezes et al. | Banking Frauds and Ways to Prevent Them | |
David | Fraud, Extortion and Identity Theft | |
Krebs | From Jacob to Target: A New Approach Is Needed to Combat Identity Theft | |
McCoy et al. | Identity Theft: Private Battle or Public Crisis? | |
Schulman et al. | The US/Mexico border crossing card(BCC): a case study in biometric, machine-readable id | |
Ratnam et al. | It and information security | |
Compomizzi et al. | Identity theft and preventive measures: the cost is all yours | |
Maurya | Prevention of identity theft in post internet era |