%0 Conference Proceedings %T Crypto-Biometric Models for Information Secrecy %+ AGH University of Science and Technology [Krakow, PL] (AGH UST) %A Ogiela, Marek, R. %A Ogiela, Lidia %A Ogiela, Urszula %Z Part 2: 4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014) %< avec comité de lecture %( Lecture Notes in Computer Science %B International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES) %C Fribourg, Switzerland %Y Stephanie Teufel %Y Tjoa A Min %Y Ilsun You %Y Edgar Weippl %I Springer %3 Availability, Reliability, and Security in Information Systems %V LNCS-8708 %P 172-178 %8 2014-09-08 %D 2014 %R 10.1007/978-3-319-10975-6_13 %K Cryptographic protocols %K bio-inspired cryptography %K secret sharing algorithms %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X In this paper will be presented some advances in crypto-biometric procedures used for encryption and division of secret data, as well as modern approaches for strategic management of divided information. Computer techniques for secret information sharing aim to secure information against disclosure to unauthorized persons. The paper will present algorithms dedicated for information division and sharing on the basis of biometric or personal features. Computer techniques for classified information sharing should also be useful in the process of shared information generation and distribution. For this purpose there will be presented a new approach for information management based on cognitive systems. %G English %Z TC 5 %Z TC 8 %Z WG 8.4 %Z WG 8.9 %2 https://inria.hal.science/hal-01403994/document %2 https://inria.hal.science/hal-01403994/file/978-3-319-10975-6_13_Chapter.pdf %L hal-01403994 %U https://inria.hal.science/hal-01403994 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC5 %~ IFIP-WG %~ IFIP-TC8 %~ IFIP-LNCS-8708 %~ IFIP-CD-ARES %~ IFIP-WG8-4 %~ IFIP-WG8-9