메뉴 건너뛰기




Volumn 6112 LNCS, Issue PART 2, 2010, Pages 296-305

Two-factor authentication or how to potentially counterfeit experimental results in biometric systems

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION SYSTEMS; BIOMETRIC AUTHENTICATION; BIOMETRIC AUTHENTICATION SYSTEM; BIOMETRIC SYSTEMS; IRIS BIOMETRICS; PERFORMANCE EVALUATION; RECOGNITION RATES; SECURITY APPLICATION; TWO FACTOR AUTHENTICATION;

EID: 77955377975     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13775-4_30     Document Type: Conference Paper
Times cited : (26)

References (17)
  • 2
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • DOI 10.1016/S0167-4048(02)00415-7
    • Chien, H., Jan, J., Tseng, Y.: An efficient and practical solution to remote authentication: Smart card. Computer and Security 21, 372-375 (2002) (Pubitemid 34715241)
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.-Y.1    Jan, J.-K.2    Tseng, Y.-M.3
  • 5
    • 16444376120 scopus 로고    scopus 로고
    • Two-factor authentication: Too little, too late
    • Schneier, B.: Two-factor authentication: too little, too late. ACM Commun. 48(4), 136 (2005)
    • (2005) ACM Commun. , vol.48 , Issue.4 , pp. 136
    • Schneier, B.1
  • 7
    • 12344259813 scopus 로고    scopus 로고
    • Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
    • Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37, 2245-2255 (2004)
    • (2004) Pattern Recognition , vol.37 , pp. 2245-2255
    • Teoh, A.B.J.1    Ngo, D.C.L.2    Goh, A.3
  • 10
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and improvements to, password security
    • Klein, D.V.: Foiling the cracker: a survey of, and improvements to, password security. In: Proceedings of the 2nd USENIX Workshop Security, pp. 5-14 (1990)
    • (1990) Proceedings of the 2nd USENIX Workshop Security , pp. 5-14
    • Klein, D.V.1
  • 14
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40, 614-634 (2001)
    • (2001) IBM Systems Journal , vol.40 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 15
    • 33745315642 scopus 로고    scopus 로고
    • An Analysis on Accuracy of Cancelable Biometrics based on BioHashing
    • Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNAI, Springer, Heidelberg
    • Cheung, K.H., Kong, A.Z.D., Kamel, M., You, J., Lam, T.H.W.: An Analysis on Accuracy of Cancelable Biometrics based on BioHashing. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 1168-1172. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3683 , pp. 1168-1172
    • Cheung, K.H.1    Kong, A.Z.D.2    Kamel, M.3    You, J.4    Lam, T.H.W.5
  • 16
    • 2942628075 scopus 로고    scopus 로고
    • Efficient Iris Recogntion by Characterizing Key Local Variations
    • Ma, L., Tan, T., Wang, Y., Zhang, D.: Efficient Iris Recogntion by Characterizing Key Local Variations. IEEE Transactions on Image Processing 13(6), 739-750 (2004)
    • (2004) IEEE Transactions on Image Processing , vol.13 , Issue.6 , pp. 739-750
    • Ma, L.1    Tan, T.2    Wang, Y.3    Zhang, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.