ND Sarier - Journal of Network and Computer Applications, 2010 - Elsevier
Recently, Bringer et al. proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionality in order to …
F Wen, W Susilo, G Yang - Wireless Personal Communications, 2015 - Springer
In a recent paper (BioMed Research International, 2013/491289), Khan et al. proposed an improved biometrics-based remote user authentication scheme with user anonymity. The …
Recently, Lin–Lai proposed 'a flexible biometrics remote user authentication scheme,'which is based on El Gamal's cryptosystem and fingerprint verification, and does not need to …
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed:(1) biometric data are not …
TAT Nguyen, TK Dang - IET Biometrics, 2019 - Wiley Online Library
Biometric‐based authentication systems offer undeniable benefits to users. However, biometric features are vulnerable to attacks, especially those happening over transmission …
AK Das, A Goswami - Journal of King Saud University-Computer and …, 2015 - Elsevier
Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication …
ZY Cheng, Y Liu, CC Chang, CX Liu - International Journal of Information …, 2013 - ijiee.org
In recent years, so many researchers have focused on the field of remote user authentication schemes. Until now, engineers have figured out a new security mechanism which is based …
AK Das - arXiv preprint arXiv:1103.3159, 2011 - arxiv.org
Recently, Li et al. proposed a secure biometric-based remote user authentication scheme using smart cards to withstand the security flaws of Li-Hwang's efficient biometric-based …
Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and privacy. The use of cryptographic primitives to …