Biometric cryptosystems: a comprehensive survey

P Kaur, N Kumar, M Singh - Multimedia Tools and Applications, 2023 - Springer
Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and
cryptosystem, where biometric provides authentication and cryptosystem imparts security …

The Emerging Challenges of Wearable Biometric Cryptosystems

KA Ajlan, T Alsboui, O Alshaikh, I Inuwa-Dute, S Khan… - Cryptography, 2024 - mdpi.com
Cryptographic key generation and data encryption and decryption using wearable biometric
technologies is an emerging research area with significant potential for authentication and …

Privacy-aware smart card based biometric authentication scheme for e-health

L Chen, K Zhang - Peer-to-Peer Networking and Applications, 2021 - Springer
Abstract Electronic health (E-health), which makes healthcare more convenient and flexible
to practitioners, is envisioned to alleviate the contradiction between limited healthcare …

Surfbcs: speeded up robust features based fuzzy vault scheme in biometric cryptosystem

P Kaur, N Kumar, M Singh - The Journal of Supercomputing, 2023 - Springer
Biometric cryptosystem (BCS) is an emerging research area in which Biometric alleviates
the need to remember passwords and cryptography provides a sense of security. The use of …

A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier

KA Patel, S Shukla, SJ Patel - Concurrency and Computation …, 2024 - Wiley Online Library
Cloud computing is an emerging paradigm that enables on‐demand data storage without
considering the local infrastructure limitations of end‐users. The extensive growth in number …

Renewable and anonymous biometrics-based remote user authentication scheme using smart cards for telecare medicine information system

AA Al-Saggaf, TR Sheltami - 2019 Advances in Science and …, 2019 - ieeexplore.ieee.org
A rise of prevalence ageing population and chronic diseases in Saudi Arabia, patients need
to be regular face-to-face meet Doctors/physicians for consultation and treatment. Telecare …

Patient Family Binding and Authentication Scheme with Privacy Protection for E‐Health System

Y Zhang, Z Huang, Q Zhu… - Security and …, 2022 - Wiley Online Library
The emergence of the E‐health system has brought convenience to many chronically ill
patients and elderly people with limited mobility. With the help of the E‐health system …

[PDF][PDF] An efficient hybrid authentication mechanism based on biometric fingerprint recognition and homomorphic encryption

G Crihan, M Crăciun, L Dumitriu - 2023 - researchgate.net
In the current security environment, where the dependence on computer systems is
increasing, and the technological field is constantly changing, the threats and vulnerabilities …

On the security of authenticated key agreement schemes for e-healthcare

A Kasi, MS Obaidat, P Rewal, D Mishra… - … and Informatics (CCCI …, 2022 - ieeexplore.ieee.org
With the rapid development of Internet and communication technology and the advances in
devices' computing power, people can avail the services of e-healthcare with ease. To …

A Non-Invertible MCC Encoded Secure Template Generation Using Random Triangle Projection and Encryption

M Imran, MS Umar, F Ahmad - 2024 - authorea.com
In recent years, due to the exponential growth in the applicability of biometric authentication
systems, it has become essential to address the privacy and security concerns of user …