2010
DOI: 10.1007/s11227-009-0379-1
|View full text |Cite
|
Sign up to set email alerts
|

Embedded access points for trusted data and resources access in HPC systems

Abstract: Biometric authentication systems represent a valid alternative to the conventional username-password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or match… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(23 citation statements)
references
References 15 publications
0
21
0
Order By: Relevance
“…The authentication of the user digital identity is classified in the three following approach [3] user recognition. These kind of systems can be easily violated, simply stealing the token or knowing the password.…”
Section: Why Biometrics?mentioning
confidence: 99%
See 3 more Smart Citations
“…The authentication of the user digital identity is classified in the three following approach [3] user recognition. These kind of systems can be easily violated, simply stealing the token or knowing the password.…”
Section: Why Biometrics?mentioning
confidence: 99%
“…For example, if a smartcard containing the biometric template is stolen, nobody will can utilize it because its biometric data will not coincide with those stored on the smartcard. The system access will be denied [3].…”
Section: Why Biometrics?mentioning
confidence: 99%
See 2 more Smart Citations
“…Current platforms are the result of generations of systems that have enabled the manipulation of big data: managing authentication, storage, processing, presentation of such information in a clear, efficient, and easy way [4,5]. In this context, the IoT paradigm may emerge successfully, since there is a need to overcome the traditional mobile computing scenarios, like smartphones and generic portable devices, and to evolve the idea in a permanent connection of objects to the environment [6].…”
Section: Introductionmentioning
confidence: 99%