메뉴 건너뛰기




Volumn 25, Issue 5, 2012, Pages 585-597

Mobile device integration of a fingerprint biometric remote authentication scheme

Author keywords

attack; biometric authentication fingerprint; hash; mobile device; security

Indexed keywords

ATTACK; BIOMETRIC AUTHENTICATION; COMPUTATION PROPERTIES; DEVICE INTEGRATION; FINGERPRINT BIOMETRICS; HASH; HASHING FUNCTIONS; REMOTE AUTHENTICATION; SECRET VALUE; SECURITY; SECURITY LEVEL; USER AUTHENTICATION SCHEME;

EID: 84860659191     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.1277     Document Type: Article
Times cited : (69)

References (36)
  • 1
    • 54349125537 scopus 로고    scopus 로고
    • A remote user authentication scheme without using smart cards
    • Rhee HS, Kwon JO, Lee DH,. A remote user authentication scheme without using smart cards. Computer Standards and Interfaces 2009; 31 (1): 6-13.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.1 , pp. 6-13
    • Rhee, H.S.1    Kwon, J.O.2    Lee, D.H.3
  • 2
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • Hwang MS, Li LH,. A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2000; 46 (1): 28-30.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 3
    • 84874800178 scopus 로고
    • A public key cryptosystem and signature scheme based on discrete logarithm
    • ElGamal T,. A public key cryptosystem and signature scheme based on discrete logarithm. IEEE Transactions on Information Theory 1985; 31 (4): 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 4
    • 0034318245 scopus 로고    scopus 로고
    • An efficient remote user authentication scheme using smart cards
    • Sun HM,. An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2000; 46 (4): 958-961.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.4 , pp. 958-961
    • Sun, H.M.1
  • 5
    • 0003629990 scopus 로고    scopus 로고
    • NIST FIPS PUB 180-2 NIST FIPS PUB 180-2, National Institute of Standard and Technology, U.S. Department of Commerce, DRAFT
    • NIST FIPS PUB 180-2. Secure Hash Standard. NIST FIPS PUB 180-2, National Institute of Standard and Technology, U.S. Department of Commerce, DRAFT, 2002.
    • (2002) Secure Hash Standard
  • 6
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • Chein HY, Jan JK, Tseng YM,. An efficient and practical solution to remote authentication: smart card. Computers and Security 2002; 21 (4): 372-375.
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 372-375
    • Chein, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 7
    • 0742268499 scopus 로고    scopus 로고
    • Security of Chein et al.'s remote user authentication scheme using smart cards
    • et al.
    • Hsu CL,. et al. Security of Chein et al.'s remote user authentication scheme using smart cards. Computer Standards and Interfaces 2004; 26 (3): 167-169.
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.3 , pp. 167-169
    • Hsu, C.L.1
  • 8
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    • Ku WC, Chen SM,. Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2004; 50 (1): 204-207.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.C.1    Chen, S.M.2
  • 9
    • 32444434862 scopus 로고    scopus 로고
    • Efficient remote mutual authentication and key agreement
    • Shieh WG, Wang JM,. Efficient remote mutual authentication and key agreement. Computers and Security 2006; 25 (1): 72-77.
    • (2006) Computers and Security , vol.25 , Issue.1 , pp. 72-77
    • Shieh, W.G.1    Wang, J.M.2
  • 10
    • 4243365845 scopus 로고    scopus 로고
    • Bellcore Press Release Bellcore Press Release, September
    • Bellcore Press Release. New threat model breaks crypto codes, Bellcore Press Release, September 1996.
    • (1996) New Threat Model Breaks Crypto Codes
  • 12
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • DOI 10.1109/TC.2002.1004593
    • Messerges TS, Dabbish EA, Sloan RH,. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51 (5): 541-552. (Pubitemid 34550462)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 13
    • 0034276289 scopus 로고    scopus 로고
    • Checking before output may not be enough against fault-based cryptanalysis
    • Yen SM, Joye M,. Checking before output may not be enough against fault-based cryptanalysis. IEEE Transactions on Computers 2002; 49 (9): 967-970.
    • (2002) IEEE Transactions on Computers , vol.49 , Issue.9 , pp. 967-970
    • Yen, S.M.1    Joye, M.2
  • 15
    • 43649083106 scopus 로고    scopus 로고
    • Cryptanalysis of a password authentication scheme over insecure networks
    • DOI 10.1016/j.jcss.2007.05.001, PII S0022000007000657
    • Xiang T, Wong KW, Liao X,. Cryptanalysis of a password authentication scheme over insecure networks. Journal of Computer and System Sciences 2008; 74 (5): 657-661. (Pubitemid 351685697)
    • (2008) Journal of Computer and System Sciences , vol.74 , Issue.5 , pp. 657-661
    • Xiang, T.1    Wong, K.-w.2    Liao, X.3
  • 16
    • 34248666700 scopus 로고    scopus 로고
    • Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
    • DOI 10.1016/j.csi.2006.11.005, PII S0920548906001322
    • Wang XM, Zhang WF, Zhang JS, Khan MK,. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards and Interfaces 2007; 29 (5): 507-512. (Pubitemid 46771122)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.5 , pp. 507-512
    • Wang, X.-M.1    Zhang, W.-F.2    Zhang, J.-S.3    Khan, M.K.4
  • 17
    • 15544370112 scopus 로고    scopus 로고
    • Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards
    • DOI 10.1049/el:20047658
    • Ku WC, Chang ST, Chiang MH,. Further cryptanalysis of fingerprint based remote user authentication scheme using smart cards. IEEE Electronics Letters 2005; 41 (5): 240-241. (Pubitemid 40401878)
    • (2005) Electronics Letters , vol.41 , Issue.5 , pp. 240-241
    • Ku, W.C.1    Chang, S.T.2    Chiang, M.H.3
  • 18
    • 0025384135 scopus 로고
    • Identity authentication on keystroke latencies
    • Joyce R, Gupta G,. Identity authentication on keystroke latencies. Communication of the ACM 1990; 33 (2): 168-176.
    • (1990) Communication of the ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 19
    • 0029214744 scopus 로고
    • Biometric, is it a viable proposition for identity authentication and access control
    • Kim HJ,. Biometric, is it a viable proposition for identity authentication and access control. Computers and Security 1995; 14 (3): 205-214.
    • (1995) Computers and Security , vol.14 , Issue.3 , pp. 205-214
    • Kim, H.J.1
  • 20
    • 0037030525 scopus 로고    scopus 로고
    • Fingerprint-based remote user authentication scheme using smart cards
    • DOI 10.1049/el:20020380
    • Lee JK, Ryu SR, Yoo KY,. Fingerprint-based remote user authentication scheme using smart cards. IEEE Electronics Letters 2002; 38 (12): 554-555. (Pubitemid 34684645)
    • (2002) Electronics Letters , vol.38 , Issue.12 , pp. 554-555
    • Lee, J.K.1    Ryu, S.R.2    Yoo, K.Y.3
  • 21
    • 4043139259 scopus 로고    scopus 로고
    • A flexible biometric remote user authentication scheme
    • Lin CH, Lai YY,. A flexible biometric remote user authentication scheme. Computer Standard and Interfaces 2004; 27 (1): 19-23.
    • (2004) Computer Standard and Interfaces , vol.27 , Issue.1 , pp. 19-23
    • Lin, C.H.1    Lai, Y.Y.2
  • 22
    • 15544370112 scopus 로고    scopus 로고
    • Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards
    • DOI 10.1049/el:20047658
    • Ku WC, Chang ST, Chiang MH,. Further cryptanalysis of fingerprint based remote user authentication scheme using smart cards. IEEE Electronics Letters 2005; 41 (5): 240-241. (Pubitemid 40401878)
    • (2005) Electronics Letters , vol.41 , Issue.5 , pp. 240-241
    • Ku, W.C.1    Chang, S.T.2    Chiang, M.H.3
  • 23
    • 33751167604 scopus 로고    scopus 로고
    • Improving the security of 'a flexible biometrics remote user authentication scheme'
    • DOI 10.1016/j.csi.2006.01.002, PII S0920548906000122
    • Khan MK, Zhang J,. Improving the security of a flexible biometrics remote user authentication scheme. Computer Standards and Interfaces 2007; 29 (1): 82-85. (Pubitemid 44773789)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.1 , pp. 82-85
    • Khan, M.K.1    Zhang, J.2
  • 24
    • 54349125537 scopus 로고    scopus 로고
    • A remote user authentication scheme without using smart cards
    • Rhee HS, Kwon JO, Lee DH,. A remote user authentication scheme without using smart cards. Computer Standards and Interfaces 2009; 31 (1): 6-13.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.1 , pp. 6-13
    • Rhee, H.S.1    Kwon, J.O.2    Lee, D.H.3
  • 25
    • 34548620637 scopus 로고    scopus 로고
    • Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
    • DOI 10.1016/j.chaos.2006.05.061, PII S096007790600498X
    • Khan MK, Zhang J, Wang X,. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solution and Fractals 2008; 35 (3): 519-524. (Pubitemid 47404851)
    • (2008) Chaos, Solitons and Fractals , vol.35 , Issue.3 , pp. 519-524
    • Khan, M.K.1    Zhang, J.2    Wang, X.3
  • 27
    • 56349171150 scopus 로고    scopus 로고
    • Biometrics and their use in e-passports
    • Ben S, Bart J,. Biometrics and their use in e-passports. Image and Version Computing 2009; 27: 305-312.
    • (2009) Image and Version Computing , vol.27 , pp. 305-312
    • Ben, S.1    Bart, J.2
  • 29
    • 38949203738 scopus 로고    scopus 로고
    • Cancelable biometrics and annotations on BioHash
    • Teoh ABJ, Kuan YW, Lee S,. Cancelable biometrics and annotations on BioHash. Pattern Recognition 2008; 41 (6): 2034-2044.
    • (2008) Pattern Recognition , vol.41 , Issue.6 , pp. 2034-2044
    • Teoh, A.B.J.1    Kuan, Y.W.2    Lee, S.3
  • 31
    • 84860671637 scopus 로고    scopus 로고
    • Fujitsu Inc. access available 24/10/ 2009
    • Fujitsu Inc. Available from: http://www.fujitsu.com/sg/services/ computing/pc/notebooks/useries/u2010/index.html, access available 24/10/ 2009.
  • 32
    • 84860693113 scopus 로고    scopus 로고
    • Mobile Gazette Inc. access available 24/10/ 2009
    • Mobile Gazette Inc. Availble from:, access available http://www. mobilegazette.com/toshiba-portege-g910-08x02x13.htm 24/10/ 2009.
  • 33
    • 84860686569 scopus 로고    scopus 로고
    • Transcend Information Inc. access available 24/10/ 2009
    • Transcend Information Inc. Available from: http://www.transcendusa.com/ Products/Modlist.asp?CatNo=95&LangNo=0, access available 24/10/ 2009.
  • 34
    • 23344449693 scopus 로고    scopus 로고
    • ID-based password authentication scheme using smart cards and fingerprints
    • Kim HS, Lee SW, Yoo KY,. ID-based password authentication scheme using smart cards and fingerprints. ACM Operating System 2003; 37 (4): 32-41.
    • (2003) ACM Operating System , vol.37 , Issue.4 , pp. 32-41
    • Kim, H.S.1    Lee, S.W.2    Yoo, K.Y.3
  • 36


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.