2011
DOI: 10.1002/dac.1277
|View full text |Cite
|
Sign up to set email alerts
|

Mobile device integration of a fingerprint biometric remote authentication scheme

Abstract: Various user authentication schemes with smart cards have been proposed. Generally, researchers implicitly assume that the contents of a smart card cannot be revealed. However, this is not true. An attacker can analyze the leaked information and obtain the secret values in a smart card. To improve on this drawback, we involve a fingerprint biometric and password to enhance the security level of the remote authentication scheme Our scheme uses only hashing functions to implement a robust authentication with a l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
63
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 68 publications
(63 citation statements)
references
References 28 publications
0
63
0
Order By: Relevance
“…In 2010, Kumar et al discussed an authentication scheme based on the concept of a unit Sphere in 3-D geometric that enhances the security [17]. Many other methods have been developed using biometric value, assuming the password with smart card is not enough to secure the system [18][19][20][21][22]. In 2002, Lee et al [19] discussed a scheme that used fingerprint and smart cards.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2010, Kumar et al discussed an authentication scheme based on the concept of a unit Sphere in 3-D geometric that enhances the security [17]. Many other methods have been developed using biometric value, assuming the password with smart card is not enough to secure the system [18][19][20][21][22]. In 2002, Lee et al [19] discussed a scheme that used fingerprint and smart cards.…”
Section: Related Workmentioning
confidence: 99%
“…Scott [24] shows that the Kim's scheme is insecure because an attacker can impersonate a legal user successfully. Lin et al combines password and fingerprint minutiae templates into super passwords and provide offline password change [25]. Mitchell et al point out that the operation of password change is vulnerable because the smart cards do not have enough ability to check the correctness of old passwords [26].…”
Section: Related Workmentioning
confidence: 99%
“…Hash function is applied in (Chen et al, 2012), (Li and Hwang, 2010), (Li et al, 2011) to biometric features to release embedded secret. Hash function is used in (Kaizhi and Aiqun, 2013) for authentication purpose.…”
Section: Cryptographic Hashesmentioning
confidence: 99%
“…In communication, the user must remain anonymous to the other entities. This scheme consists of three phases: registration (initialization phase), authentication (first phase), and roaming (second phase) [14][15][16]. When an MU is anonymously roaming in a foreign network, it can use one of two methods: real-time online and offline.…”
Section: Introductionmentioning
confidence: 99%