2022
DOI: 10.1002/spy2.261
|View full text |Cite
|
Sign up to set email alerts
|

Biometric multi‐factor authentication: On the usability of the FingerPIN scheme

Abstract: Fingerprint-based authentication has been successfully adopted in a wide range of applications, including law enforcement and immigration, due to its numerous advantages over traditional password-based authentication. Despite the usability and accuracy of this technology, some significant concerns still exist, which can potentially hinder its further adoption. For instance, a fingerprint is permanently associated with an individual and, once stolen, cannot be replaced, thus compromising biometric-based authent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 16 publications
(21 reference statements)
0
7
0
Order By: Relevance
“…Here, the validation and veri cation of a person's identity are based on unique physical characteristics -biometrics -of their ngerprints. 23 The security of this process is guaranteed by the fact that, although two or more ngerprints may share the same global features, there are currently no known pairs of ngerprints with identical pattern of local features, also called minutiae points. 24 Besides the individuality of the ngerprint, the premises for ngerprint authentication/identi cation rely on the pattern persistence, meaning that the characteristics of ngerprints must be stable over time.…”
Section: Resultsmentioning
confidence: 99%
“…Here, the validation and veri cation of a person's identity are based on unique physical characteristics -biometrics -of their ngerprints. 23 The security of this process is guaranteed by the fact that, although two or more ngerprints may share the same global features, there are currently no known pairs of ngerprints with identical pattern of local features, also called minutiae points. 24 Besides the individuality of the ngerprint, the premises for ngerprint authentication/identi cation rely on the pattern persistence, meaning that the characteristics of ngerprints must be stable over time.…”
Section: Resultsmentioning
confidence: 99%
“…The time efficiency of the proposed PAD system was also computed. Time efficiency indicates the time required by the system to be executed on the available resources [35,36]. It is defined as the elapsed time from the moment the input data is captured until the decision is output [37].…”
Section: Resultsmentioning
confidence: 99%
“…Fog nodes need to reliably verify each other's identities before engaging in communication. This involves secure key exchange protocols and, for an extra layer of security, the integration of biometric or multi-factor authentication methods [155]- [159]. With the help of user credentials like passwords, authentication is achieved.…”
Section: Identity Management and Authenticationmentioning
confidence: 99%