作者
Tee Connie, Andrew Teoh, Michael Goh, David Ngo
发表日期
2004/9
期刊
Pattern Analysis and Applications
卷号
7
页码范围
255-268
出版商
Springer-Verlag
简介
Many systems require a reliable personal authentication infrastructure to recognise the identity of a claimant before granting access to him/her. Conventional secure measures include the possession of an identity card or special knowledge like password and personal identification numbers (PINs). These methods are insecure as they can be lost, forgotten and potentially be shared among a group of co-workers for a long time without change. The fact that biometric authentication is convenient and non-refutable makes it a popular approach for a personal identification system. Nevertheless, biometric methods suffer from some inherent limitations and security threats. A more practical approach is to combine two-factor or mor authenticators to achieve a higher level of security. This paper proposes a novel dual-factor authenticator based on the iterated inner product between tokenised pseudorandom numbers …
引用总数
20052006200720082009201020112012201320142015201620172018201920202021202220232265681332453366321
学术搜索中的文章
T Connie, A Teoh, M Goh, D Ngo - Pattern Analysis and Applications, 2004