메뉴 건너뛰기




Volumn 5, Issue 4, 2011, Pages 1-12

A novel mutual authentication scheme based on fingerprint biometric and nonce using smart cards

Author keywords

Attack; Authentication; Fingerprint verification; Nonce; Security; Smart card

Indexed keywords

ATTACK; AUTHENTICATION SCHEME; CLOCK SYNCHRONIZATION; COMPUTATION COSTS; DENIAL OF SERVICE ATTACKS; DOS ATTACKS; FINGERPRINT BIOMETRICS; FINGERPRINT VERIFICATION; HIGH POTENTIAL; IMPROVED SCHEME; INSECURE NETWORKS; INSIDER ATTACK; MUTUAL AUTHENTICATION; NONCE; REMOTE USER AUTHENTICATION SCHEMES; SECURITY; SECURITY ANALYSIS; TIME-STAMP; VERIFICATION TABLES;

EID: 84860385112     PISSN: 17389976     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (7)

References (17)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password authentication with insecure communication", Communications of the ACM, 24(11) 1981, pp. 770-772.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 2
    • 0032137355 scopus 로고    scopus 로고
    • A password authentication method for contents communication on the Internet
    • A. Shimizu, T. Horioka, and H. Inagaki, "A password authentication method for contents communication on the Internet", IEICE Transactions on Communications, E81-B(8), 1998, pp. 1666-1673.
    • (1998) IEICE Transactions on Communications , vol.E81-B , Issue.8 , pp. 1666-1673
    • Shimizu, A.1    Horioka, T.2    Inagaki, H.3
  • 3
    • 28044451335 scopus 로고    scopus 로고
    • Robust remote authentication scheme with smart cards
    • C. Fan, Y. Chan, and Z. Zhang, "Robust remote authentication scheme with smart cards", Computers & Security, 24, 2005, pp. 619-628.
    • (2005) Computers & Security , vol.24 , pp. 619-628
    • Fan, C.1    Chan, Y.2    Zhang, Z.3
  • 4
    • 1542335451 scopus 로고    scopus 로고
    • Efficient password authenticated key agreement using smart card
    • W. Juang, "Efficient password authenticated key agreement using smart card", Computer & Security, 23, 2004, pp. 167-173.
    • (2004) Computer & Security , vol.23 , pp. 167-173
    • Juang, W.1
  • 5
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    • W. Ku and S. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards", IEEE Transactions on Consumer Electronics, 50(1), 2004, pp. 204-207.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.1    Chen, S.2
  • 6
    • 0041698517 scopus 로고    scopus 로고
    • A remote user authentication scheme using hash functions
    • C. Lee, L. Li, and M. Hwang, "A remote user authentication scheme using hash functions", ACM Operating Systems Review, 36(4), 2002, pp. 23-29.
    • (2002) ACM Operating Systems Review , vol.36 , Issue.4 , pp. 23-29
    • Lee, C.1    Li, L.2    Hwang, M.3
  • 7
    • 0033704170 scopus 로고    scopus 로고
    • Methods for protecting password transmission
    • M. Peyravian and N. Zunic, "Methods for protecting password transmission", Computers & Security, 19(5), 2000, pp. 466-469.
    • (2000) Computers & Security , vol.19 , Issue.5 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 8
    • 33744725812 scopus 로고    scopus 로고
    • A hash-based strong-password authentication scheme without using smart cards
    • W. Ku, "A hash-based strong-password authentication scheme without using smart cards", ACM Operating Systems Review, 38(1),,2004, pp. 29-34.
    • (2004) ACM Operating Systems Review , vol.38 , Issue.1 , pp. 29-34
    • Ku, W.1
  • 9
    • 33744757940 scopus 로고    scopus 로고
    • Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
    • W. Ku, C. Chen, and H. Lee, "Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme", ACM Operating Systems Review, 37(4), 2003, pp. 9-25.
    • (2003) ACM Operating Systems Review , vol.37 , Issue.4 , pp. 9-25
    • Ku, W.1    Chen, C.2    Lee, H.3
  • 10
    • 21644467750 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
    • H. Wen, T. Lee, and T. Hwang, "Provably secure three-party password-based authenticated key exchange protocol using Weil pairing", IEE Proceedings of Communications, 152(2), 2005, pp. 138-143.
    • (2005) IEE Proceedings of Communications , vol.152 , Issue.2 , pp. 138-143
    • Wen, H.1    Lee, T.2    Hwang, T.3
  • 11
    • 0037030525 scopus 로고    scopus 로고
    • Fingerprint-based remote user authentication scheme using smart cards
    • J.K. Lee, S.R. Ryu, and K.Y. Yoo, "Fingerprint-based remote user authentication scheme using smart cards", Electronics Letters, 38(12), 2002, pp. 554-555.
    • (2002) Electronics Letters , vol.38 , Issue.12 , pp. 554-555
    • Lee, J.K.1    Ryu, S.R.2    Yoo, K.Y.3
  • 12
    • 4043139259 scopus 로고    scopus 로고
    • A flexible biometrics remote user authentication scheme
    • C.H. Lin and Y.Y. Lai, "A flexible biometrics remote user authentication scheme", Computer Standards & Interfaces, 27(1), 2004, pp. 19-23.
    • (2004) Computer Standards & Interfaces , vol.27 , Issue.1 , pp. 19-23
    • Lin, C.H.1    Lai, Y.Y.2
  • 13
    • 15544370112 scopus 로고    scopus 로고
    • Further cryptanalysis of fingerprint-based remote user authentication scheme using smart cards
    • W.C. Ku, S.T. Chang, and M.H. Chiang, "Further cryptanalysis of fingerprint-based remote user authentication scheme using smart cards", Electronics Letters, 41(5), 2005, 240-241.
    • (2005) Electronics Letters , vol.41 , Issue.5 , pp. 240-241
    • Ku, W.C.1    Chang, S.T.2    Chiang, M.H.3
  • 14
    • 33751167604 scopus 로고    scopus 로고
    • Improving the security of 'a flexible biometrics remote user authentication scheme'
    • M.K. Khan and J.S. Zhang, "Improving the security of 'a flexible biometrics remote user authentication scheme'", Computer Standards & Interfaces, 29, 2007, pp. 82-85.
    • (2007) Computer Standards & Interfaces , vol.29 , pp. 82-85
    • Khan, M.K.1    Zhang, J.S.2
  • 15
    • 62549133356 scopus 로고    scopus 로고
    • Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
    • W.S. Juang, S.T. Chen, and H.T. Liaw, "Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards", IEEE Transactions on Industrial Electronics, 55(6), 2008, pp. 2551-2556.
    • (2008) IEEE Transactions on Industrial Electronics , vol.55 , Issue.6 , pp. 2551-2556
    • Juang, W.S.1    Chen, S.T.2    Liaw, H.T.3
  • 16
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    • W. Kuand and S. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards", IEEE Transactions Consumer Electronics, 50(1), 2004, pp. 204-207.
    • (2004) IEEE Transactions Consumer Electronics , vol.50 , Issue.1 , pp. 204-207
    • Kuand, W.1    Chen, S.2
  • 17
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computer
    • R.M. Needham and M.D. Schroeder, "Using encryption for authentication in large networks of computer", Communication of the ACM, 21(12), 1978, pp. 993-998.
    • (1978) Communication of the ACM , vol.21 , Issue.12 , pp. 993-998
    • Needham, R.M.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.