2007
DOI: 10.1016/j.csi.2006.01.002
|View full text |Cite
|
Sign up to set email alerts
|

Improving the security of ‘a flexible biometrics remote user authentication scheme’

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
84
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 145 publications
(84 citation statements)
references
References 19 publications
0
84
0
Order By: Relevance
“…has been used to design biometrics-based user authentication schemes [7][8][9][10]. There are several advantages of using biometrics key as compared to traditional passwords.…”
Section: Introductionmentioning
confidence: 99%
“…has been used to design biometrics-based user authentication schemes [7][8][9][10]. There are several advantages of using biometrics key as compared to traditional passwords.…”
Section: Introductionmentioning
confidence: 99%
“…In 1990, Hwang et al [2] proposed a non-interactive password authentication scheme and its improved version, which additionally uses smart cards. Since then, many password authentication schemes using smart cards have been proposed [3,4,5], and each has its advantages and disadvantages. In 2001, Juang [6] constructed an enhanced version of authentication scheme based on hash function and symmetric key cryptosystem.…”
Section: Related Workmentioning
confidence: 99%
“…In 2004 Lin and Lai [10] proposed a "flexible biometric remote user authentication scheme". But Khan and Zhang [11] has shown that, this scheme is susceptible to the server spoofing attack. In 2010 Li and Hwang [12] proposed a remote user authentication scheme based on biometric verification but above scheme does not provide proper authentication and cannot resist manin-the middle attack, as shown by Li et al [13] in 2011.…”
Section: Introductionmentioning
confidence: 99%