메뉴 건너뛰기




Volumn 3, Issue , 2013, Pages 1694-1698

Biometric-Kerberos authentication scheme for secure mobile computing services

Author keywords

Biometrics; Kerberos authentication; Mobile computing; Watermarking

Indexed keywords

AUTHENTICATION PROTOCOLS; AUTHENTICATION SCHEME; BIOMETRIC AUTHENTICATION; COMPUTING CAPABILITY; IDENTITY AUTHENTICATION; KERBEROS AUTHENTICATION; KEY DISTRIBUTION CENTERS; RESOURCE CONSTRAINT;

EID: 84897807264     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISP.2013.6743949     Document Type: Conference Paper
Times cited : (8)

References (17)
  • 5
    • 84897810126 scopus 로고    scopus 로고
    • Passwords are pass but biometrics are not mobile
    • April
    • Passwords are pass but biometrics are not mobile. Science News, April 23, 2010.
    • (2010) Science News , vol.23
  • 9
    • 33744955096 scopus 로고    scopus 로고
    • Preprocessing of a fingerprint image captured with a mobile camera
    • Springer
    • Chulhan Lee, Sanghoon Lee, Jaihie Kim, and Sung-Jae Kim. Preprocessing of a fingerprint image captured with a mobile camera. In Advances in Biometrics, pages 348-355. Springer, 2005.
    • (2005) Advances in Biometrics , pp. 348-355
    • Lee, C.1    Lee, S.2    Kim, J.3    Kim, S.-J.4
  • 11
    • 0025479451 scopus 로고
    • Project athena as a distributed computer system
    • George A Champine, Jr DE Geer, and William N Ruh. Project athena as a distributed computer system. Computer, 23(9):40-51, 1990.
    • (1990) Computer , vol.23 , Issue.9 , pp. 40-51
    • Champine, G.A.1    De Geer, J.2    Ruh, W.N.3
  • 13
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • B Clifford Neuman and Theodore Ts'o. Kerberos: An authentication service for computer networks. Communications Magazine, IEEE, 32(9):33-38, 1994.
    • (1994) Communications Magazine, IEEE , vol.32 , Issue.9 , pp. 33-38
    • Clifford Neuman, B.1    Theodore, T.2
  • 16
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Roger M Needham and Michael D Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 17
    • 84871372675 scopus 로고    scopus 로고
    • M-identity and its authentication protocol for secure mobile commerce applications
    • Springer
    • Fengling Han and Ron van Schyndel. M-identity and its authentication protocol for secure mobile commerce applications. In Cyberspace Safety and Security, pages 1-10. Springer, 2012.
    • (2012) Cyberspace Safety and Security , pp. 1-10
    • Han, F.1    Van, R.Schyndel.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.