메뉴 건너뛰기




Volumn 26, Issue 3, 2009, Pages 191-195

Fingerprint biometric-based self-authentication and deniable authentication schemes for the electronic world

Author keywords

Attacks; Authentication; Biometrics; Deniable; Fingerprint; Password

Indexed keywords

APPLICATION SCENARIO; ATTACKS; DENIABLE; DENIABLE AUTHENTICATION; E-COMMERCE; EAVESDROPPING ATTACKS; ELECTRONIC WORLD; FINGERPRINT; FINGERPRINT BIOMETRICS; HIGH POTENTIAL; PASSWORD; SECURITY ANALYSIS; SECURITY FLAWS; SELF-AUTHENTICATION; THIRD PARTIES;

EID: 67549132170     PISSN: 02564602     EISSN: None     Source Type: Journal    
DOI: 10.4103/0256-4602.50703     Document Type: Article
Times cited : (66)

References (22)
  • 2
    • 84957619091 scopus 로고    scopus 로고
    • Authentication, enhanced security and error correcting codes
    • Proceedings of Crypto'98, Santa Barbara, USA, Springer-Verlag
    • Y. Aumann, and M. Rabin, "Authentication, enhanced security and error correcting codes", Proceedings of Crypto'98, Santa Barbara, USA, LNCS Springer-Verlag, vol. 1462, 1998, pp. 299-303.
    • (1998) LNCS , vol.1462 , pp. 299-303
    • Aumann, Y.1    Rabin, M.2
  • 3
    • 67549089004 scopus 로고    scopus 로고
    • th birthday, 1998, online available at http://www.cs.cityu.edu.hk/dept/video.html.
    • th birthday, 1998, online available at http://www.cs.cityu.edu.hk/dept/video.html.
  • 5
    • 0037019232 scopus 로고    scopus 로고
    • Deniable authentication protocol based on Diffie-Hellman algorithm
    • L. Fan, C.X. Xu, and J.H. Li, "Deniable authentication protocol based on Diffie-Hellman algorithm", Electronics Letters, vol. 38, pp. 705-6, 2002.
    • (2002) Electronics Letters , vol.38 , pp. 705-706
    • Fan, L.1    Xu, C.X.2    Li, J.H.3
  • 6
    • 2342455866 scopus 로고    scopus 로고
    • Efficient deniable authentication protocol based on generalized ElGamal signature scheme
    • Z. Shao, "Efficient deniable authentication protocol based on generalized ElGamal signature scheme", Computer Standards and Interfaces, vol. 26, pp. 449-54, 2004.
    • (2004) Computer Standards and Interfaces , vol.26 , pp. 449-454
    • Shao, Z.1
  • 7
    • 24944490931 scopus 로고    scopus 로고
    • E.J. Yoon, E.K. Ryu, and K.Y. Yoo, Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm, Applied Mathematics and Computation, 167, pp. 247-80, 2005.
    • E.J. Yoon, E.K. Ryu, and K.Y. Yoo, "Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm", Applied Mathematics and Computation, vol. 167, pp. 247-80, 2005.
  • 8
    • 14844309431 scopus 로고    scopus 로고
    • Non-interactive deniable authentication protocol based on factoring
    • R. Lu, and Z. Cao, "Non-interactive deniable authentication protocol based on factoring", Computer Standards and Interfaces, vol. 27, 401-5, 2005.
    • (2005) Computer Standards and Interfaces , vol.27 , pp. 401-405
    • Lu, R.1    Cao, Z.2
  • 9
    • 26044448602 scopus 로고    scopus 로고
    • A new deniable authentication protocol from bilinear pairings
    • R. Lu, and Z. Cao, "A new deniable authentication protocol from bilinear pairings", Applied Mathematics and Computation, vol. 168, 954-61, 2005.
    • (2005) Applied Mathematics and Computation , vol.168 , pp. 954-961
    • Lu, R.1    Cao, Z.2
  • 10
    • 15544375802 scopus 로고    scopus 로고
    • Identity-based deniable authentication protocol
    • Y. Shi, and J. Li, "Identity-based deniable authentication protocol", IEE Electronics Letters, vol. 41, pp. 241-2, 2005.
    • (2005) IEE Electronics Letters , vol.41 , pp. 241-242
    • Shi, Y.1    Li, J.2
  • 11
    • 33845950814 scopus 로고    scopus 로고
    • A novel deniable authentication protocol using generalized ElGamal signature scheme
    • W.B. Lee, C.C. Wu, and W.J. Tsaur, "A novel deniable authentication protocol using generalized ElGamal signature scheme", Information Sciences, vol. 77, pp. 1376-81, 2007.
    • (2007) Information Sciences , vol.77 , pp. 1376-1381
    • Lee, W.B.1    Wu, C.C.2    Tsaur, W.J.3
  • 13
    • 0037030525 scopus 로고    scopus 로고
    • Fingerprint-based remote user authentication scheme using smart cards
    • J.K. Lee, S.R. Ryu, and K.Y. Yoo, "Fingerprint-based remote user authentication scheme using smart cards", IEE Electronics Letters, vol. 38, pp. 554-5, 2002.
    • (2002) IEE Electronics Letters , vol.38 , pp. 554-555
    • Lee, J.K.1    Ryu, S.R.2    Yoo, K.Y.3
  • 14
    • 15544370112 scopus 로고    scopus 로고
    • Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards
    • W.C. Ku, S.T. Chang, and M.H. Chiang, "Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards", IEE Electronics Letters, vol. 41, 2005.
    • (2005) IEE Electronics Letters , vol.41
    • Ku, W.C.1    Chang, S.T.2    Chiang, M.H.3
  • 15
    • 33751167604 scopus 로고    scopus 로고
    • Improving the security of 'a flexible biometrics remote user authentication scheme'
    • M.K. Khan, and J. Zhang, "Improving the security of 'a flexible biometrics remote user authentication scheme'", Computer Standards & Interfaces, vol. 29, pp. 82-5, 2007.
    • (2007) Computer Standards & Interfaces , vol.29 , pp. 82-85
    • Khan, M.K.1    Zhang, J.2
  • 18
    • 48149110492 scopus 로고    scopus 로고
    • Local binary patterns for a hybrid fingerprint matcher
    • L. Nanni, and A. Lumini, "Local binary patterns for a hybrid fingerprint matcher", Pattern Recognition, vol. 41, pp. 3461-6, 2008.
    • (2008) Pattern Recognition , vol.41 , pp. 3461-3466
    • Nanni, L.1    Lumini, A.2
  • 19
    • 77951831414 scopus 로고    scopus 로고
    • FM model based fingerprint reconstruction from minutiae template
    • June, To Appear
    • J. Feng, and A. K. Jain, "FM model based fingerprint reconstruction from minutiae template", International conference on Biometrics (ICB), June 2009 (To Appear).
    • (2009) International conference on Biometrics (ICB)
    • Feng, J.1    Jain, A.K.2
  • 20
    • 0036030112 scopus 로고    scopus 로고
    • T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, Impacts of artificial gummy fingers on fingerprint system, Optical society and counterfeit deterrence techniques I V, proceedings of SPIE, 4677, 2002, pp. 275-89.
    • T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, "Impacts of artificial "gummy" fingers on fingerprint system", Optical society and counterfeit deterrence techniques I V, proceedings of SPIE, vol. 4677, 2002, pp. 275-89.
  • 21
    • 67549111388 scopus 로고    scopus 로고
    • Spoof proof fingerprinting
    • R.K. Rowe, "Spoof proof fingerprinting", Sensors Magazine, vol. 22, pp. 1-4, 2005.
    • (2005) Sensors Magazine , vol.22 , pp. 1-4
    • Rowe, R.K.1
  • 22
    • 54449094667 scopus 로고    scopus 로고
    • A secure dynamic ID based remote user authentication scheme for multi-server environment
    • Y.P. Liao, and S.S. Wang, "A secure dynamic ID based remote user authentication scheme for multi-server environment", Computer Standards & Interfaces, vol. 31, pp. 24-9, 2009.
    • (2009) Computer Standards & Interfaces , vol.31 , pp. 24-29
    • Liao, Y.P.1    Wang, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.