메뉴 건너뛰기




Volumn 4, Issue 4, 2009, Pages 933-945

Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics

Author keywords

Biometrics; Passwords; Remote authentication; Security and privacy; Smart cards

Indexed keywords

AUTHENTICATION SCHEME; BIOMETRIC DATA; COMPUTATION COSTS; PRIVACY PROTECTION; PROVABLY SECURE; REMOTE AUTHENTICATION; REMOTE SERVERS; SECURITY AND PRIVACY;

EID: 70450285606     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2009.2031942     Document Type: Article
Times cited : (137)

References (26)
  • 1
    • 34547307379 scopus 로고    scopus 로고
    • Fingerprint identification and verification system using minutiae matching
    • F. A. Afsar, M. Arif, and M. Hussain, "Fingerprint identification and verification system using minutiae matching," in Proc. National Conf. Emerging Technologies, 2004, pp. 141-146.
    • (2004) Proc. National Conf. Emerging Technologies , pp. 141-146
    • Afsar, F.A.1    Arif, M.2    Hussain, M.3
  • 2
    • 0005078946 scopus 로고
    • Entity authentication and key distribution
    • Lecture Notes in Computer Science
    • M. Bellare and P. Rogaway, "Entity authentication and key distribution," in Proc. Advances in Cryptology (CRYPTO'93), 1993, vol.773, pp. 22-26, Lecture Notes in Computer Science.
    • (1993) Proc. Advances in Cryptology (CRYPTO'93) , vol.773 , pp. 22-26
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 33645767442 scopus 로고    scopus 로고
    • Remarks on fingerprint-based remote user authentication scheme using smart cards
    • C. C. Chang and I. C. Lin, "Remarks on fingerprint-based remote user authentication scheme using smart cards," ACM SIGOPS Operating Syst. Rev., vol.38, no.4, pp. 91-96, 2004.
    • (2004) ACM SIGOPS Operating Syst. Rev , vol.38 , Issue.4 , pp. 91-96
    • Chang, C.C.1    Lin, I.C.2
  • 6
    • 8844234621 scopus 로고    scopus 로고
    • On the relation of error correction and cryptography to an offine biometric based identication scheme
    • G. I. Davida, B. J. Matt, R. Peralta, and Y. Frankel, "On the relation of error correction and cryptography to an offine biometric based identication scheme," in Proc. Workshop Coding Cryptography, 1999, pp. 129-138.
    • (1999) Proc. Workshop Coding Cryptography , pp. 129-138
    • Davida, G.I.1    Matt, B.J.2    Peralta, R.3    Frankel, Y.4
  • 7
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Eurocrypt 2004, pp. 523-540.
    • (2004) Eurocrypt , pp. 523-540
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 9
    • 33747624401 scopus 로고    scopus 로고
    • Combining crypto with biometrics effectively
    • Jan.
    • F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively," IEEE Trans. Comput., vol.55, no.1, pp. 1081-1088, Jan. 2006.
    • (2006) IEEE Trans. Comput , vol.55 , Issue.1 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 10
    • 0033281339 scopus 로고    scopus 로고
    • A fuzzy commitment scheme
    • Computer and Communications Security
    • A. Juels and M. Wattenberg, "A fuzzy commitment scheme," in Proc. ACMConf. Computer and Communications Security, 1999, pp. 28-36.
    • (1999) Proc. ACMConf , pp. 28-36
    • Juels, A.1    Wattenberg, M.2
  • 12
    • 23344449693 scopus 로고    scopus 로고
    • ID-based password authentication scheme using smart cards and fingerprints
    • H. S. Kim, J. K. Lee, and K. Y.Yoo, "ID-based password authentication scheme using smart cards and fingerprints," ACM SIGOPS Operating Syst. Rev., vol.37, no.4, pp. 32-41, 2003.
    • (2003) ACM SIGOPS Operating Syst. Rev , vol.37 , Issue.4 , pp. 32-41
    • Kim, H.S.1    Lee, J.K.2    Yoo, K.Y.3
  • 13
    • 0037030525 scopus 로고    scopus 로고
    • Fingerprint-based remote user authentication scheme using smart cards
    • J. K. Lee, S. R. Ryu, and K. Y. Yoo, "Fingerprint-based remote user authentication scheme using smart cards," Electron. Lett., vol.38, no.12, pp. 554-555, 2002.
    • (2002) Electron. Lett , vol.38 , Issue.12 , pp. 554-555
    • Lee, J.K.1    Ryu, S.R.2    Yoo, K.Y.3
  • 15
    • 4043139259 scopus 로고    scopus 로고
    • A flexible biometrics remote user authentication scheme
    • C. H. Lin and Y. Y. Lai, "A flexible biometrics remote user authentication scheme," Comput. Standards Interfaces, vol.27, no.1, pp. 19-23, 2004.
    • (2004) Comput. Standards Interfaces , vol.27 , Issue.1 , pp. 19-23
    • Lin, C.H.1    Lai, Y.Y.2
  • 16
    • 3042781449 scopus 로고    scopus 로고
    • Toward reliable user authentication through biometrics
    • May/Jun.
    • V. Matyas, Jr. and Z. Riha, "Toward reliable user authentication through biometrics," IEEE Security Privacy, vol.1, no.3, pp. 45-49, May/Jun. 2003.
    • (2003) IEEE Security Privacy , vol.1 , Issue.3 , pp. 45-49
    • Matyas Jr., V.1    Riha, Z.2
  • 19
    • 0025405980 scopus 로고
    • A critique of the Burrows, Abadi, and Needham logic
    • D. M. Nessett, "A critique of the Burrows, Abadi, and Needham logic," Operating Syst. Rev., vol.24, no.2, pp. 35-38, 1990.
    • (1990) Operating Syst. Rev , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.M.1
  • 22
    • 85088053686 scopus 로고    scopus 로고
    • Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
    • ser New York: Springer-Verlag
    • L. Rila and C. J. Mitchell, Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards, ser. Lecture Notes in Computer Science. New York: Springer-Verlag, 2005, vol.3482, pp. 488-497.
    • (2005) Lecture Notes in Computer Science , vol.3482 , pp. 488-497
    • Rila, L.1    Mitchell, C.J.2
  • 23
    • 33645758252 scopus 로고    scopus 로고
    • Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints
    • M. Scott, "Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints," ACM SIGOPS Operating Syst. Rev., vol.38, no.2, pp. 73-75, 2004.
    • (2004) ACM SIGOPS Operating Syst. Rev , vol.38 , Issue.2 , pp. 73-75
    • Scott, M.1
  • 24
    • 34548074162 scopus 로고    scopus 로고
    • Protecting biometric templates with sketch: Theory and practice
    • Sep.
    • Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Trans. Inf. Forensics Security, vol.2, no.3, pp. 503-512, Sep. 2007.
    • (2007) IEEE Trans. Inf. Forensics Security , vol.2 , Issue.3 , pp. 503-512
    • Sutcu, Y.1    Li, Q.2    Memon, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.