메뉴 건너뛰기




Volumn 96, Issue 9, 2014, Pages 793-816

More efficient key-hash based fingerprint remote authentication scheme using mobile device

Author keywords

Attacks and drawbacks; Authentication; Fingerprint; Mobile device; Random nonce

Indexed keywords

BIOMETRICS; MOBILE DEVICES; SOLITONS; UBIQUITOUS COMPUTING;

EID: 84906780054     PISSN: 0010485X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00607-013-0308-2     Document Type: Article
Times cited : (51)

References (37)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • DOI 10.1145/358790.358797
    • Lamport L (1981) Password authentication with insecure communication. Commun ACM 24:770-772 (Pubitemid 12462508)
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport Leslie1
  • 2
    • 0000270009 scopus 로고
    • Password authentication without using password table
    • 10.1016/0020-0190(95)00087-S 0875.68391
    • Horng G (1995) Password authentication without using password table. Inf Process Lett 55:247-250
    • (1995) Inf Process Lett , vol.55 , pp. 247-250
    • Horng, G.1
  • 3
    • 0002063278 scopus 로고    scopus 로고
    • Paramita wisdom' password authentication scheme without verification tables
    • 10.1016/S0164-1212(98)00006-5
    • Jan JK, Chen YY (1998) Paramita wisdom' password authentication scheme without verification tables. J Syst Softw 42:45-57
    • (1998) J Syst Softw , vol.42 , pp. 45-57
    • Jan, J.K.1    Chen, Y.Y.2
  • 4
    • 0003224934 scopus 로고
    • The S/KEY one-time password, system
    • Haller NM (1995) The S/KEY one-time password, system, RFC1760
    • (1995) RFC , vol.1760
    • Haller, N.M.1
  • 5
    • 0013456359 scopus 로고    scopus 로고
    • Comments on the S/KEY user authentication scheme
    • Mitchell CJ, Chen l (1996) Comments on the S/KEY user authentication scheme. ACMOSR 30:12-16 (Pubitemid 126459423)
    • (1996) Operating Systems Review (ACM) , vol.30 , Issue.4 , pp. 12-16
    • Mitchell, C.J.1    Chen, L.2
  • 6
    • 0001459651 scopus 로고
    • A dynamic password authentication method by one-way function
    • Shimizu A (1990) A dynamic password authentication method by one-way function. IEICE Trans Inf Syst 73-D-I:630-636
    • (1990) IEICE Trans Inf Syst , vol.7350 , pp. 630-636
    • Shimizu, A.1
  • 7
    • 0034140374 scopus 로고    scopus 로고
    • New remote user authentication scheme using smart cards
    • DOI 10.1109/30.826377
    • Hwang MS, Li LH (2000) A new remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(1):28-30 (Pubitemid 30582655)
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang Min-Shiang1    Li Li-Hua2
  • 8
    • 0034318245 scopus 로고    scopus 로고
    • Efficient remote use authentication scheme using smart cards
    • DOI 10.1109/30.920446
    • Sun HM (2000) An efficient remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(4):958-961 (Pubitemid 32089809)
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.4 , pp. 958-961
    • Sun Hung-Min1
  • 9
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • DOI 10.1016/S0167-4048(02)00415-7
    • Chein HY, Jan JK, Tseng YM (2002) An efficient and practical solution to remote authentication: smart card. Comput Secur 21(4):372-375 (Pubitemid 34715241)
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.-Y.1    Jan, J.-K.2    Tseng, Y.-M.3
  • 10
    • 0742268499 scopus 로고    scopus 로고
    • Security of Chein et al.'s remote user authentication scheme using smart cards
    • 10.1016/S0920-5489(03)00094-1
    • Hsu CL (2004) Security of Chein et al.'s remote user authentication scheme using smart cards. Comput Stand Interfaces 26(3):167-169
    • (2004) Comput Stand Interfaces , vol.26 , Issue.3 , pp. 167-169
    • Hsu, C.L.1
  • 11
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    • 10.1109/TCE.2004.1277863
    • Ku WC, Chen SM (2004) Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans Consum Electron 50(1):204-207
    • (2004) IEEE Trans Consum Electron , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.C.1    Chen, S.M.2
  • 12
    • 33748126252 scopus 로고    scopus 로고
    • A password authentication scheme over insecure networks
    • 1094.68027 2227799
    • Liao IE, Lee CC, Hwang MS (2006) A password authentication scheme over insecure networks. J Comput Syst Sci 72(4):727-740
    • (2006) J Comput Syst Sci , vol.72 , Issue.4 , pp. 727-740
    • Liao, I.E.1    Lee, C.C.2    Hwang, M.S.3
  • 13
    • 43649083106 scopus 로고    scopus 로고
    • Cryptanalysis of a password authentication scheme over insecure networks
    • DOI 10.1016/j.jcss.2007.05.001, PII S0022000007000657
    • Xiang T, Wong KW, Liao X (2008) Cryptanalysis of a password authentication scheme over insecure networks. J Comput Syst Sci 74(5):657-661 (Pubitemid 351685697)
    • (2008) Journal of Computer and System Sciences , vol.74 , Issue.5 , pp. 657-661
    • Xiang, T.1    Wong, K.-w.2    Liao, X.3
  • 14
    • 34248666700 scopus 로고    scopus 로고
    • Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
    • DOI 10.1016/j.csi.2006.11.005, PII S0920548906001322
    • Wang XM, Zhang WF, Zhang JS, Khan MK (2007) Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Comput Stand Interfaces 29(5):507-512 (Pubitemid 46771122)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.5 , pp. 507-512
    • Wang, X.-M.1    Zhang, W.-F.2    Zhang, J.-S.3    Khan, M.K.4
  • 15
    • 78751642788 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme
    • 10.1016/j.comcom.2010.02.011
    • Khan MK, Kim SK, Alghathbar K (2010) Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme. Comput Commun 34(3):305-309
    • (2010) Comput Commun , vol.34 , Issue.3 , pp. 305-309
    • Khan, M.K.1    Kim, S.K.2    Alghathbar, K.3
  • 16
    • 34548620637 scopus 로고    scopus 로고
    • Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
    • DOI 10.1016/j.chaos.2006.05.061, PII S096007790600498X
    • Khan MK, Zhang J, Wang X (2008) Chaotic hash based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons & Fractals 35(3):519-524 (Pubitemid 47404851)
    • (2008) Chaos, Solitons and Fractals , vol.35 , Issue.3 , pp. 519-524
    • Khan, M.K.1    Zhang, J.2    Wang, X.3
  • 17
    • 84860659191 scopus 로고    scopus 로고
    • Mobile device integration of a fingerprint biometric remote authentication scheme
    • 10.1002/dac.1277 10.1002/dac.1277
    • Chen CL, Lee CC, Hsu CY (2012) Mobile device integration of a fingerprint biometric remote authentication scheme. Int J Commun Syst 25:585-597. doi: 10.1002/dac.1277
    • (2012) Int J Commun Syst , vol.25 , pp. 585-597
    • Chen, C.L.1    Lee, C.C.2    Hsu, C.Y.3
  • 18
    • 0037030525 scopus 로고    scopus 로고
    • Fingerprint-based remote user authentication scheme using smart cards
    • DOI 10.1049/el:20020380
    • Lee JK, Ryu SR, Yoo KY (2002) Fingerprint based remote user authentication scheme using smart cards. Electron Lett 38:554-555 (Pubitemid 34684645)
    • (2002) Electronics Letters , vol.38 , Issue.12 , pp. 554-555
    • Lee, J.K.1    Ryu, S.R.2    Yoo, K.Y.3
  • 19
    • 4043139259 scopus 로고    scopus 로고
    • A flexible biometrics remote user authentication scheme
    • 10.1016/j.csi.2004.03.003
    • Lin CH, Lai YY (2004) A flexible biometrics remote user authentication scheme. Comput Stand Interfaces 27(1):19-23
    • (2004) Comput Stand Interfaces , vol.27 , Issue.1 , pp. 19-23
    • Lin, C.H.1    Lai, Y.Y.2
  • 20
    • 33751167604 scopus 로고    scopus 로고
    • Improving the security of 'a flexible biometrics remote user authentication scheme'
    • DOI 10.1016/j.csi.2006.01.002, PII S0920548906000122
    • Khan MK, Zhang J (2007) Improving the security of 'a flexible biometrics remote user authentication scheme'. Comput Stand Interfaces 29:82-85 (Pubitemid 44773789)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.1 , pp. 82-85
    • Khan, M.K.1    Zhang, J.2
  • 21
    • 77952339469 scopus 로고    scopus 로고
    • A biometric-based user authentication for wireless sensor networks
    • 10.1007/s11859-010-0318-2 10.1007/s11859-010-0318-2
    • Yuan J, Jiang C, Jiang Z (2010) A biometric-based user authentication for wireless sensor networks. Wuhan Univ J Nat Sci 15:272-276. doi: 10.1007/s11859-010-0318-2
    • (2010) Wuhan Univ J Nat Sci , vol.15 , pp. 272-276
    • Yuan, J.1    Jiang, C.2    Jiang, Z.3
  • 22
    • 84866625525 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card
    • 10.2478/s13537-012-0003-y
    • Saru K, Gupta MK, Kumar M (2012) Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card. Cent Eur J Comput Sci 2(1):60-75
    • (2012) Cent Eur J Comput Sci , vol.2 , Issue.1 , pp. 60-75
    • Saru, K.1    Gupta, M.K.2    Kumar, M.3
  • 23
    • 84863229262 scopus 로고    scopus 로고
    • Improvement of a fingerprint-based remote user authentication scheme
    • Xu J, Zhu WT, Feng DG (2008) Improvement of a fingerprint-based remote user authentication scheme. Int J Secur Appl 2(3):73-80
    • (2008) Int J Secur Appl , vol.2 , Issue.3 , pp. 73-80
    • Xu, J.1    Zhu, W.T.2    Feng, D.G.3
  • 24
    • 84867158765 scopus 로고    scopus 로고
    • Security weaknesses of a biometric-based remote user authentication scheme using smart cards
    • An Y (2012) Security weaknesses of a biometric-based remote user authentication scheme using smart cards. Int J Biosci Biotechnol 4(3):21-28
    • (2012) Int J Biosci Biotechnol , vol.4 , Issue.3 , pp. 21-28
    • An, Y.1
  • 25
    • 84860385112 scopus 로고    scopus 로고
    • A novel mutual authentication scheme based on fingerprint biometric and nonce using smart cards
    • 1274.65012
    • Wang D, Li J (2011) A novel mutual authentication scheme based on fingerprint biometric and nonce using smart cards. Int J Secur Appl 5(4):1-12
    • (2011) Int J Secur Appl , vol.5 , Issue.4 , pp. 1-12
    • Wang, D.1    Li, J.2
  • 28
    • 54349125537 scopus 로고    scopus 로고
    • A remote user authentication scheme without using smart cards
    • 10.1016/j.csi.2007.11.017
    • Rhee HS, Kwon JO, Lee DH (2009) A remote user authentication scheme without using smart cards. Comput Stand Interfaces 31(1):6-13
    • (2009) Comput Stand Interfaces , vol.31 , Issue.1 , pp. 6-13
    • Rhee, H.S.1    Kwon, J.O.2    Lee, D.H.3
  • 30
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • DOI 10.1109/TC.2002.1004593
    • Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541-552 (Pubitemid 34550462)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 31
    • 0034276289 scopus 로고    scopus 로고
    • Checking before output may not be enough against fault-based cryptanalysis
    • Yen SM, Joye M (2002) Checking before output may not be enough against fault-based cryptanalysis. IEEE Trans Comput 49(9):967-970
    • (2002) IEEE Trans Comput , vol.49 , Issue.9 , pp. 967-970
    • Yen, S.M.1    Joye, M.2
  • 34
    • 61849087915 scopus 로고    scopus 로고
    • Cryptanalysis of a mutual authentication scheme based on nonce and smart cards
    • 10.1016/j.comcom.2008.12.023
    • Sun DZ, Huai JP, Sun JZ, Li JX (2009) Cryptanalysis of a mutual authentication scheme based on nonce and smart cards. Comput Commun 32(6):1015-1017
    • (2009) Comput Commun , vol.32 , Issue.6 , pp. 1015-1017
    • Sun, D.Z.1    Huai, J.P.2    Sun, J.Z.3    Li, J.X.4
  • 35
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public key authentication protocol
    • 10.1016/0020-0190(95)00144-2 0875.94114
    • Lowe G (1995) An attack on the Needham-Schroeder public key authentication protocol. Inf Process Lett 56(3):131-136
    • (1995) Inf Process Lett , vol.56 , Issue.3 , pp. 131-136
    • Lowe, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.