Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A survey of security and privacy issues in ePassport protocols
Avoine G., Beaujeant A., Hernandez-Castro J., Demay L., Teuwen P. ACM Computing Surveys48 (3):1-37,2016.Type:Article
Date Reviewed: Mar 25 2016

The security measures of ePassports that conform to International Civil Aviation Organization (ICAO) specifications are covered in this paper.

The security mechanisms and the data storage design are discussed in great detail. Several actual and potential attacks are also described, and recommendations for addressing them are presented. The attacks are directed toward identifying a passport and reading the data it contains; no counterfeiting attacks are covered.

Ample references are provided. In the PDF copy I reviewed, not all of the illustrations rendered properly; this may have been an issue with the local reader rather than the original document. At 37 pages, the paper’s length is sufficient to cover the material presented.

In summary, this paper is recommended reading for those with an interest in the security of international travel, and professionals with an interest in security design, particularly in relation to radio frequency identification (RFID) tags.

Reviewer:  Neil D. Burgess Review #: CR144261 (1606-0444)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (K.6.5 )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy