Al‐Saggaf, 2018 - Google Patents
Key binding biometrics‐based remote user authentication scheme using smart cardsAl‐Saggaf, 2018
View PDF- Document ID
- 1828549244806772654
- Author
- Al‐Saggaf A
- Publication year
- Publication venue
- IET Biometrics
External Links
Snippet
Remote user authentication schemes using smart cards provide solutions for securing user authentication. The schemes rely on passwords or biometric or both, which fall apart if the password is not kept secret. Additionally, the passwords can be stolen, lost, or forgotten and …
- 238000005516 engineering process 0 description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Cryptanalysis and improvement of a biometric-based multi-server authentication and key agreement scheme | |
Wazid et al. | Design of an efficient and provably secure anonymity preserving three‐factor user authentication and key agreement scheme for TMIS | |
Li | A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card | |
US10797879B2 (en) | Methods and systems to facilitate authentication of a user | |
Jiang et al. | A privacy preserving three-factor authentication protocol for e-health clouds | |
Xi et al. | A fingerprint based bio‐cryptographic security protocol designed for client/server authentication in mobile computing environment | |
Pagnin et al. | Privacy‐Preserving Biometric Authentication: Challenges and Directions | |
Mishra et al. | Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems | |
Li et al. | Robust three‐factor remote user authentication scheme with key agreement for multimedia systems | |
Liu et al. | A secure data backup scheme using multi‐factor authentication | |
JP4885853B2 (en) | Renewable and private biometrics | |
Barman et al. | Provably secure multi-server authentication protocol using fuzzy commitment | |
Yeh et al. | Robust elliptic curve cryptography‐based three factor user authentication providing privacy of biometric data | |
Chen et al. | Lightweight one‐time password authentication scheme based on radio‐frequency fingerprinting | |
Kumar et al. | Development of a new cryptographic construct using palmprint-based fuzzy vault | |
Mahesh Kumar et al. | BMIAE: blockchain‐based multi‐instance iris authentication using additive ElGamal homomorphic encryption | |
Odelu et al. | An efficient biometric‐based privacy‐preserving three‐party authentication with key agreement protocol using smart cards | |
Wang et al. | Cryptanalysis of Three Password‐Based Remote User Authentication Schemes with Non‐Tamper‐Resistant Smart Card | |
Giri et al. | A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer USB mass storage devices | |
Zhang et al. | Remote three‐factor authentication scheme based on Fuzzy extractors | |
Al‐Saggaf | Key binding biometrics‐based remote user authentication scheme using smart cards | |
Yang et al. | Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments | |
Nguyen et al. | Privacy preserving biometric‐based remote authentication with secure processing unit on untrusted server | |
Hossain et al. | ICAS: Two-factor identity-concealed authentication scheme for remote-servers | |
Kang et al. | Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain |