2013 6th International Congress on Image and Signal Processing (CISP) 2013
DOI: 10.1109/cisp.2013.6743940
|View full text |Cite
|
Sign up to set email alerts
|

An enhanced biometrics-based remote user authentication scheme using smart cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…Using password or smart cards as the only way of authentication for remote users is vulnerable to security attacks. Thus, the authors of [ 142 ] proposed a novel scheme by using a three-factor authentication. The fingerprint or iris-scan, the smart card, and a password to authenticate a user to remotely-based applications.…”
Section: Analysis Of Iot Authentication Schemesmentioning
confidence: 99%
“…Using password or smart cards as the only way of authentication for remote users is vulnerable to security attacks. Thus, the authors of [ 142 ] proposed a novel scheme by using a three-factor authentication. The fingerprint or iris-scan, the smart card, and a password to authenticate a user to remotely-based applications.…”
Section: Analysis Of Iot Authentication Schemesmentioning
confidence: 99%
“…Although this method offers mutual authentication and message confidentiality, it is susceptible to smart card loss attacks [151]. As such, the threefactor authentication approach in [152] has been presented to address this issue. To provide authorization in an IoT environment, security solutions are presented in [153] and [154].…”
Section: Related Workmentioning
confidence: 99%
“…The scheme is also prone to man-in-middle-attack and impersonation attack. The attacker can cheat the server by impersonating the user or can impersonate the server to cheat the user without knowing any secret information [29][30][31] Combining ID based cryptography with biometric techniques can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. The biometric technology is regarded as a powerful solution due to its unique link to an identity individual, which almost impossible to fake.…”
Section: Review Of Related Workmentioning
confidence: 99%