2004
DOI: 10.1007/978-3-540-24591-9_27
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprint-Based Authentication for USB Token Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…(2) Helper data based: In helper data-based template security scheme, the secure sketch obtained via binding the template with a codeword from an error correcting code (ECC) and stored into the system database instead of the original template. In the authentication phase, it is easy to decode the sketch and recover the template through obtaining an query which is sufficiently close to the enrolled template [11,12]. Specially, Juels and Wattenberg [13] contribute a Fuzzy Commitment (FC) scheme that combines the technique of ECC to tolerate the difference and uses Hash functions to secure the random information vector.…”
Section: Introductionmentioning
confidence: 99%
“…(2) Helper data based: In helper data-based template security scheme, the secure sketch obtained via binding the template with a codeword from an error correcting code (ECC) and stored into the system database instead of the original template. In the authentication phase, it is easy to decode the sketch and recover the template through obtaining an query which is sufficiently close to the enrolled template [11,12]. Specially, Juels and Wattenberg [13] contribute a Fuzzy Commitment (FC) scheme that combines the technique of ECC to tolerate the difference and uses Hash functions to secure the random information vector.…”
Section: Introductionmentioning
confidence: 99%
“…There are mainly two kinds of encryption algorithm, one is the password analysis and the other is password design. In the password design, it can be fatherly divided into traditional password and chaos password [2] . The representative of traditional password is DES/IDEA/AES and so on which are mainly based on number theory.…”
Section: Introductionmentioning
confidence: 99%