2010
DOI: 10.1109/msp.2010.1
|View full text |Cite
|
Sign up to set email alerts
|

A mobile biometric system-on-token system for signing digital transactions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Fingerprint ridges and valleys are unique and unalterable. Fingerprint biometric is used in numerous applications that comprise of various applications like military, law enforcement, medicine, education, civil service, forensics, driver license registration, Mobile Phone access [2], [3], System log-in process and like [4]. Nowadays live Fingerprint readers based on optical, ultrasonic methods and etc are used in place of traditional method of ink to capture Fingerprint.…”
Section: Fingerprint Biometric Conceptmentioning
confidence: 99%
“…Fingerprint ridges and valleys are unique and unalterable. Fingerprint biometric is used in numerous applications that comprise of various applications like military, law enforcement, medicine, education, civil service, forensics, driver license registration, Mobile Phone access [2], [3], System log-in process and like [4]. Nowadays live Fingerprint readers based on optical, ultrasonic methods and etc are used in place of traditional method of ink to capture Fingerprint.…”
Section: Fingerprint Biometric Conceptmentioning
confidence: 99%
“…Attacker can convince user for application installation and granting permission through phishing techniques. The whole things make this process more risky [15,16].…”
Section: B Obtaining Mobile Transaction Authentication Numbermentioning
confidence: 99%
“…Thanks to improvements in microelectronics, new possibilities have appeared in the last years in the field of ID tokens. Two different ideas have been followed: some work has been done including biometric processes inside already available devices, such as mobile phones [3,4]. Other approach followed has been designing complete new dedicated HW to perform those high computational processes to reduce the computational load of the main processor.…”
Section: Id Token Architecturementioning
confidence: 99%