Babamir et al., 2020 - Google Patents
A multibiometric cryptosystem for user authentication in client-server networksBabamir et al., 2020
View PDF- Document ID
- 13635653143233827231
- Author
- Babamir F
- Kırcı M
- Publication year
- Publication venue
- Computer Networks
External Links
Snippet
A biometric authentication scheme enables a client to log into a network system in which the safeguarding of critical data or/and controlling access are signified. A biometric-based network system verifies users who are the owners of legal biometric information. To secure …
- 238000004321 preservation 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wazid et al. | LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment | |
Xi et al. | A fingerprint based bio‐cryptographic security protocol designed for client/server authentication in mobile computing environment | |
Fan et al. | Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics | |
Bringer et al. | An application of the Goldwasser-Micali cryptosystem to biometric authentication | |
Yu et al. | An efficient generic framework for three-factor authentication with provably secure instantiation | |
US8281148B2 (en) | Securely computing a similarity measure | |
Barman et al. | Fingerprint-based crypto-biometric system for network security | |
Gomez-Barrero et al. | Privacy-preserving comparison of variable-length data with application to biometric template protection | |
Karabat et al. | THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system | |
Gomez-Barrero et al. | Implementation of fixed-length template protection based on homomorphic encryption with application to signature biometrics | |
Giri et al. | A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer USB mass storage devices | |
Babamir et al. | A multibiometric cryptosystem for user authentication in client-server networks | |
Barman et al. | A novel secure key-exchange protocol using biometrics of the sender and receiver | |
Wu et al. | Privacy-preserving cancelable biometric authentication based on RDM and ECC | |
Sarkar et al. | A novel session key generation and secure communication establishment protocol using fingerprint biometrics | |
KR101010218B1 (en) | Biometric authentication method | |
Kanade et al. | Generating and sharing biometrics based session keys for secure cryptographic applications | |
Babamir et al. | Dynamic digest based authentication for client–server systems using biometric verification | |
Bauspieß et al. | BRAKE: Biometric Resilient Authenticated Key Exchange | |
Maitra et al. | Analysis and enhancement of secure three-factor user authentication using Chebyshev Chaotic Map | |
Abidin et al. | Security of a privacy-preserving biometric authentication protocol revisited | |
KR100986980B1 (en) | Biometric authentication method, client and server | |
Zhang et al. | BioP-TAP: An efficient method of template protection and two-factor authentication protocol combining biometric and PUF | |
Wang et al. | Privacy‐Preserving Fingerprint Authentication Using D‐H Key Exchange and Secret Sharing | |
Kirci et al. | A digest-based method for efficiency improvement of security in biometrical cryptography authentication |