메뉴 건너뛰기




Volumn 4, Issue 5, 2011, Pages 487-499

A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment

Author keywords

Bio cryptography, mobile computing, biometric, fingerprint authentication

Indexed keywords

AUTHENTICATION; BIOMETRICS; CHROMIUM COMPOUNDS; COMPUTATIONAL EFFICIENCY; MOBILE COMPUTING; MOBILE SECURITY; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY;

EID: 78649321231     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.225     Document Type: Article
Times cited : (84)

References (40)
  • 1
    • 79955021325 scopus 로고    scopus 로고
    • Data on PDAs mostly unprotected. Network World Fusion. Available from
    • Shaw K. Data on PDAs mostly unprotected. Network World Fusion. Available from 2004.
    • (2004)
    • Shaw, K.1
  • 2
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2): 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 4
    • 79955045522 scopus 로고
    • Use of elliptic curves in cryptography, CRYPTO 85
    • Miller V. Use of elliptic curves in cryptography, CRYPTO 85, 1985.
    • (1985)
    • Miller, V.1
  • 9
    • 33947177191 scopus 로고    scopus 로고
    • Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
    • Teoh A, Goh A, Ngo D. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Transactions on Pattern Analysis and Machine Intelligence 2006; 28(12): 1892-1901.
    • (2006) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.28 , Issue.12 , pp. 1892-1901
    • Teoh, A.1    Goh, A.2    Ngo, D.3
  • 10
    • 10044284550 scopus 로고    scopus 로고
    • Cancellable Biometric Filters forFace Recognition. Proceedings of IEEE International Conference Pattern Recognition, Cambridge, UK, August
    • Savvides M, Vijayakumar B. Cancellable Biometric Filters forFace Recognition. Proceedings of IEEE International Conference Pattern Recognition, volume 3, pages 922-925, Cambridge, UK, August 2004.
    • (2004) , vol.3 , pp. 922-925
    • Savvides, M.1    Vijayakumar, B.2
  • 12
    • 37849020774 scopus 로고    scopus 로고
    • 2N Discretisation of BioPhasor in Cancellable Biometrics, Proceedings of Second International Conference on Biometrics, Seoul, South Korea
    • Teoh A, Toh K, Yip W. 2N Discretisation of BioPhasor in Cancellable Biometrics, Proceedings of Second International Conference on Biometrics, Seoul, South Korea, 2007; 435-444.
    • (2007) , pp. 435-444
    • Teoh, A.1    Toh, K.2    Yip, W.3
  • 13
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
    • Dodis Y, Ostrovsky R, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM Journal of Computing 2008; 38(1): 97-139.
    • (2008) SIAM Journal of Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 16
    • 70449508376 scopus 로고    scopus 로고
    • Biometric mobile template protection: a composite feature based fingerprint fuzzy vault, IEEE International Conference on Communications, Dresden, Germany
    • Xi K, Hu J. Biometric mobile template protection: a composite feature based fingerprint fuzzy vault, IEEE International Conference on Communications, Dresden, Germany, 2009.
    • (2009)
    • Xi, K.1    Hu, J.2
  • 17
    • 84947613118 scopus 로고    scopus 로고
  • 18
    • 84947617288 scopus 로고    scopus 로고
  • 19
    • 84947611913 scopus 로고    scopus 로고
  • 20
    • 84947617629 scopus 로고    scopus 로고
  • 21
    • 33947528272 scopus 로고    scopus 로고
    • A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing
    • Wang Y, Hu J, Phillips D. A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing. IEEE Transactions on PAMI 2007; 29(4): 573-585.
    • (2007) IEEE Transactions on PAMI , vol.29 , Issue.4 , pp. 573-585
    • Wang, Y.1    Hu, J.2    Phillips, D.3
  • 22
    • 79955045851 scopus 로고    scopus 로고
    • FIPS. 180-2: Secure Hash Standard (SHS) 25 February
    • FIPS. 180-2: Secure Hash Standard (SHS) 25 February 2004.
    • (2004)
  • 23
    • 79955035588 scopus 로고    scopus 로고
    • Watson. NIST special database 24, live-scan digital video fingerprint database. Technical report, U.S. National Institute of Standards and Technology
    • Watson. NIST special database 24, live-scan digital video fingerprint database. Technical report, U.S. National Institute of Standards and Technology, 1998.
    • (1998)
  • 24
    • 33751580079 scopus 로고    scopus 로고
    • FV C2002: Second Fingerprint Verification Competition, ICPR, 16th International Conference on Pattern Recognition (ICPR'02) Volume 3
    • Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK. 'FV C2002: Second Fingerprint Verification Competition, ' ICPR, vol. 3, pp. 30811, 16th International Conference on Pattern Recognition (ICPR'02) Volume 3, 2002.
    • (2002) , vol.3 , pp. 30811
    • Maio, D.1    Maltoni, D.2    Cappelli, R.3    Wayman, J.L.4    Jain, A.K.5
  • 25
    • 36348986198 scopus 로고    scopus 로고
    • Fingerprint-based Fuzzy Vault: Implementation and Performance, IEEE Transactions on on Informatics Forensics and Security, 744-757, December
    • Nandakumar K, Jain AK, Pankanti S. Fingerprint-based Fuzzy Vault: Implementation and Performance, IEEE Transactions on on Informatics Forensics and Security, vol. 2, no. 4, pp. 744-757, December 2007.
    • (2007) , vol.2 , Issue.4
    • Nandakumar, K.1    Jain, A.K.2    Pankanti, S.3
  • 26
    • 79954992266 scopus 로고    scopus 로고
    • Sun Website, URL:
    • Sun Website, URL: 2009.
    • (2009)
  • 27
    • 79955033278 scopus 로고    scopus 로고
    • Bouncy Castle. Lightweight API, The Legion of the Bouncy Castle
    • Bouncy Castle. Lightweight API, The Legion of the Bouncy Castle, 2008.
    • (2008)
  • 28
    • 79955044886 scopus 로고    scopus 로고
    • Certicom. SEC 2: Recommended Elliptic Curve Domain Parameters, Certicom Corp.
    • Certicom. SEC 2: Recommended Elliptic Curve Domain Parameters, Certicom Corp., 2000.
    • (2000)
  • 29
    • 72849117130 scopus 로고    scopus 로고
    • Efficient Mobile Voting System Security Scheme based on Elliptic Curve Cryptography, International Workshop on Intelligent Decision Support Systems and Applications in Networked and Distributed Systems, IEEE 3rd International Conference on Network & System Security (NSS09), Gold Coast, Australia, October
    • Ahmad T, Hu J, Han S. Efficient Mobile Voting System Security Scheme based on Elliptic Curve Cryptography, International Workshop on Intelligent Decision Support Systems and Applications in Networked and Distributed Systems, IEEE 3rd International Conference on Network & System Security (NSS09), Gold Coast, Australia, October 2009; 19-21.
    • (2009) , pp. 19-21
    • Ahmad, T.1    Hu, J.2    Han, S.3
  • 30
    • 33744948730 scopus 로고    scopus 로고
    • A novel hybrid crypto-biometric authentication scheme for ATM based banking applications, IAPR International Conference on Biometrics (ICB2006), Hong Kong China, 5-7 January, 2006. Published at Lecture Notes in Computer Science, Springer
    • Han F, Hu J, Yu X, Feng Y, Zhou J. A novel hybrid crypto-biometric authentication scheme for ATM based banking applications, IAPR International Conference on Biometrics (ICB2006), Hong Kong China, 5-7 January, 2006. Published at Lecture Notes in Computer Science, Springer, vol. 3832/2005, 2005; 675-681.
    • (2005) , vol.3832 , Issue.2005 , pp. 675-681
    • Han, F.1    Hu, J.2    Yu, X.3    Feng, Y.4    Zhou, J.5
  • 31
    • 79955011596 scopus 로고    scopus 로고
    • Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic
    • Mahmood A, Hu J, Tari Z, Leckie C. Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic. Journal of Network and Computer Applications, 2010.
    • (2010) Journal of Network and Computer Applications
    • Mahmood, A.1    Hu, J.2    Tari, Z.3    Leckie, C.4
  • 33
    • 77955333989 scopus 로고    scopus 로고
    • A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Special Issue on Information and Communications Security, Privacy and Trust: Standards and Regulations
    • Hu J, Chen HH, Hou TW. A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Special Issue on Information and Communications Security, Privacy and Trust: Standards and Regulations. Computer Standards & Interfaces, 274-280.
    • Computer Standards & Interfaces , pp. 274-280
    • Hu, J.1    Chen, H.H.2    Hou, T.W.3
  • 34
    • 68949196337 scopus 로고    scopus 로고
    • A Program based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
    • Hoang X.D, Hu J, Bertok P. A Program based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference. Journal of Network and Computer Applications, Elsevier, 2009; 32: 1219-1228.
    • (2009) Journal of Network and Computer Applications, Elsevier , vol.32 , pp. 1219-1228
    • Hoang, X.D.1    Hu, J.2    Bertok, P.3
  • 35
    • 67349221790 scopus 로고    scopus 로고
    • A pixel-based scrambling scheme for digital medical images protection
    • Hu J, Han F. A pixel-based scrambling scheme for digital medical images protection. Journal of Network and Computer Applications, 2009; 32: 788-794.
    • (2009) Journal of Network and Computer Applications , vol.32 , pp. 788-794
    • Hu, J.1    Han, F.2
  • 36
    • 65249107163 scopus 로고    scopus 로고
    • A simple and efficient data processing scheme for HMM based anomaly intrusion detection. Special Issue of Advances on Network Intrusion Detection
    • Hu J, Qiu D, Chen HH, Yu X. A simple and efficient data processing scheme for HMM based anomaly intrusion detection. Special Issue of Advances on Network Intrusion Detection. IEEE Network, 2009; 23(1): 42-47.
    • (2009) IEEE Network , vol.23 , Issue.1 , pp. 42-47
    • Hu, J.1    Qiu, D.2    Chen, H.H.3    Yu, X.4
  • 38
    • 33847297478 scopus 로고    scopus 로고
    • Enhanced gradient-based algorithm for the estimation of fingerprint orientation field
    • Wang Y, Hu J, Han F. Enhanced gradient-based algorithm for the estimation of fingerprint orientation field. Applied Mathematics and Computation, 2007; 185(2): 823-833.
    • (2007) Applied Mathematics and Computation , vol.185 , Issue.2 , pp. 823-833
    • Wang, Y.1    Hu, J.2    Han, F.3
  • 39
    • 33847305360 scopus 로고    scopus 로고
    • Fingerprint images encryption via multi-scroll chaotic attractors
    • Han F, Hu J, Yu X, Wang Y. Fingerprint images encryption via multi-scroll chaotic attractors. Applied Mathematics and Computation, 2007; 185: 931-939.
    • (2007) Applied Mathematics and Computation , vol.185 , pp. 931-939
    • Han, F.1    Hu, J.2    Yu, X.3    Wang, Y.4
  • 40
    • 64749114044 scopus 로고    scopus 로고
    • On multi-scroll chaotic attractors in hysteresis-based piecewise linear systems
    • Han F, Yu X, Feng Y, Hu J. On multi-scroll chaotic attractors in hysteresis-based piecewise linear systems. IEEE Transactions on Circuits and Systems-II, 2007; 54(11): 1004-1008.
    • (2007) IEEE Transactions on Circuits and Systems-II , vol.54 , Issue.11 , pp. 1004-1008
    • Han, F.1    Yu, X.2    Feng, Y.3    Hu, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.