[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Al‐Saggaf, 2018 - Google Patents

Key binding biometrics‐based remote user authentication scheme using smart cards

Al‐Saggaf, 2018

View PDF @Full View
Document ID
1828549244806772654
Author
Al‐Saggaf A
Publication year
Publication venue
IET Biometrics

External Links

Snippet

Remote user authentication schemes using smart cards provide solutions for securing user authentication. The schemes rely on passwords or biometric or both, which fall apart if the password is not kept secret. Additionally, the passwords can be stolen, lost, or forgotten and …
Continue reading at ietresearch.onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Wang et al. Cryptanalysis and improvement of a biometric-based multi-server authentication and key agreement scheme
Wazid et al. Design of an efficient and provably secure anonymity preserving three‐factor user authentication and key agreement scheme for TMIS
Li A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
US10797879B2 (en) Methods and systems to facilitate authentication of a user
Jiang et al. A privacy preserving three-factor authentication protocol for e-health clouds
Xi et al. A fingerprint based bio‐cryptographic security protocol designed for client/server authentication in mobile computing environment
Pagnin et al. Privacy‐Preserving Biometric Authentication: Challenges and Directions
Mishra et al. Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems
Li et al. Robust three‐factor remote user authentication scheme with key agreement for multimedia systems
Liu et al. A secure data backup scheme using multi‐factor authentication
JP4885853B2 (en) Renewable and private biometrics
Barman et al. Provably secure multi-server authentication protocol using fuzzy commitment
Yeh et al. Robust elliptic curve cryptography‐based three factor user authentication providing privacy of biometric data
Chen et al. Lightweight one‐time password authentication scheme based on radio‐frequency fingerprinting
Kumar et al. Development of a new cryptographic construct using palmprint-based fuzzy vault
Mahesh Kumar et al. BMIAE: blockchain‐based multi‐instance iris authentication using additive ElGamal homomorphic encryption
Odelu et al. An efficient biometric‐based privacy‐preserving three‐party authentication with key agreement protocol using smart cards
Wang et al. Cryptanalysis of Three Password‐Based Remote User Authentication Schemes with Non‐Tamper‐Resistant Smart Card
Giri et al. A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer USB mass storage devices
Zhang et al. Remote three‐factor authentication scheme based on Fuzzy extractors
Al‐Saggaf Key binding biometrics‐based remote user authentication scheme using smart cards
Yang et al. Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments
Nguyen et al. Privacy preserving biometric‐based remote authentication with secure processing unit on untrusted server
Hossain et al. ICAS: Two-factor identity-concealed authentication scheme for remote-servers
Kang et al. Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain