[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Babamir et al., 2020 - Google Patents

A multibiometric cryptosystem for user authentication in client-server networks

Babamir et al., 2020

View PDF
Document ID
13635653143233827231
Author
Babamir F
Kırcı M
Publication year
Publication venue
Computer Networks

External Links

Snippet

A biometric authentication scheme enables a client to log into a network system in which the safeguarding of critical data or/and controlling access are signified. A biometric-based network system verifies users who are the owners of legal biometric information. To secure …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
Wazid et al. LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
Xi et al. A fingerprint based bio‐cryptographic security protocol designed for client/server authentication in mobile computing environment
Fan et al. Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics
Bringer et al. An application of the Goldwasser-Micali cryptosystem to biometric authentication
Yu et al. An efficient generic framework for three-factor authentication with provably secure instantiation
US8281148B2 (en) Securely computing a similarity measure
Barman et al. Fingerprint-based crypto-biometric system for network security
Gomez-Barrero et al. Privacy-preserving comparison of variable-length data with application to biometric template protection
Karabat et al. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system
Gomez-Barrero et al. Implementation of fixed-length template protection based on homomorphic encryption with application to signature biometrics
Giri et al. A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer USB mass storage devices
Babamir et al. A multibiometric cryptosystem for user authentication in client-server networks
Barman et al. A novel secure key-exchange protocol using biometrics of the sender and receiver
Wu et al. Privacy-preserving cancelable biometric authentication based on RDM and ECC
Sarkar et al. A novel session key generation and secure communication establishment protocol using fingerprint biometrics
KR101010218B1 (en) Biometric authentication method
Kanade et al. Generating and sharing biometrics based session keys for secure cryptographic applications
Babamir et al. Dynamic digest based authentication for client–server systems using biometric verification
Bauspieß et al. BRAKE: Biometric Resilient Authenticated Key Exchange
Maitra et al. Analysis and enhancement of secure three-factor user authentication using Chebyshev Chaotic Map
Abidin et al. Security of a privacy-preserving biometric authentication protocol revisited
KR100986980B1 (en) Biometric authentication method, client and server
Zhang et al. BioP-TAP: An efficient method of template protection and two-factor authentication protocol combining biometric and PUF
Wang et al. Privacy‐Preserving Fingerprint Authentication Using D‐H Key Exchange and Secret Sharing
Kirci et al. A digest-based method for efficiency improvement of security in biometrical cryptography authentication