-
1
-
-
33744779400
-
Biometrics: A tool for information security
-
Jun
-
A. K. Jain, A. Ross, and S. Pankanti, "Biometrics: A tool for information security," IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 125-143, Jun. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.2
, pp. 125-143
-
-
Jain, A.K.1
Ross, A.2
Pankanti, S.3
-
2
-
-
84868090556
-
Provably secure single sign-on scheme in distributed systems and networks
-
Jun
-
J. Yu, G. Wang, and Y. Mu, "Provably secure single sign-on scheme in distributed systems and networks," in Proc. IEEE 11th TrustCom, Jun. 2012, pp. 271-278.
-
(2012)
Proc. IEEE 11th TrustCom
, pp. 271-278
-
-
Yu, J.1
Wang, G.2
Mu, Y.3
-
3
-
-
84871821096
-
Security analysis of a single sign-on mechanism for distributed computer networks
-
Feb
-
G. Wang, J. Yu, and Q. Xie, "Security analysis of a single sign-on mechanism for distributed computer networks," IEEE Trans. Ind. Informat., vol. 9, no. 1, pp. 294-302, Feb. 2013.
-
(2013)
IEEE Trans. Ind. Informat.
, vol.9
, Issue.1
, pp. 294-302
-
-
Wang, G.1
Yu, J.2
Xie, Q.3
-
4
-
-
0019634370
-
Password authentication with insecure communication
-
Nov
-
L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
5
-
-
0026153410
-
Remote password authentication with smart cards
-
May
-
C.-C. Chang and T.-C. Wu, "Remote password authentication with smart cards," IEE Proc.-E Comput. Digital Techn., vol. 138, no. 3, pp. 165-168, May 1991.
-
(1991)
IEE Proc.-E Comput. Digital Techn.
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.-C.1
Wu, T.-C.2
-
7
-
-
3042781449
-
Toward reliable user authentication through biometrics
-
May/Jun
-
V. Matyas, Jr., and Z. Ríha, "Toward reliable user authentication through biometrics," IEEE Security Privacy, vol. 1, no. 3, pp. 45-49, May/Jun. 2003.
-
(2003)
IEEE Security Privacy
, vol.1
, Issue.3
, pp. 45-49
-
-
Matyas, V.1
Ríha, Z.2
-
8
-
-
84891752344
-
Smart environment as a service: Three factor cloud based user authentication for telecare medical information system
-
Z. Siddiqui, A.-H. Abdullah, M. K. Khan, and A. S. Alghamdi, "Smart environment as a service: Three factor cloud based user authentication for telecare medical information system," J. Med. Syst., vol. 38, no. 1, pp. 1-14, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.1
, pp. 1-14
-
-
Siddiqui, Z.1
Abdullah, A.-H.2
Khan, M.K.3
Alghamdi, A.S.4
-
9
-
-
0033350090
-
Password authentication schemes with smart cards
-
W.-H. Yang and S.-P. Shieh, "Password authentication schemes with smart cards," Comput. Security, vol. 18, no. 8, pp. 727-733, 1999.
-
(1999)
Comput. Security
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.-H.1
Shieh, S.-P.2
-
10
-
-
0036429021
-
An enhancement of timestamp-based password authentication scheme
-
L. Fan, J.-H. Li, and H.-W. Zhu, "An enhancement of timestamp-based password authentication scheme," Comput. Security, vol. 21, no. 7, pp. 665-667, 2002.
-
(2002)
Comput. Security
, vol.21
, Issue.7
, pp. 665-667
-
-
Fan, L.1
Li, J.-H.2
Zhu, H.-W.3
-
11
-
-
0242552286
-
Security enhancement for the timestamp-based password authentication scheme using smart cards
-
J.-J. Shena, C.-W. Linb, and M.-S. Hwang, "Security enhancement for the timestamp-based password authentication scheme using smart cards," Comput. Security, vol. 22, no. 7, pp. 591-595, 2003.
-
(2003)
Comput. Security
, vol.22
, Issue.7
, pp. 591-595
-
-
Shena, J.-J.1
Linb, C.-W.2
Hwang, M.-S.3
-
12
-
-
12244291938
-
An improvement of the Yang-Shieh password authentication schemes
-
C.-C. Yanga, R.-C. Wang, and T.-Y. Chang, "An improvement of the Yang-Shieh password authentication schemes," Appl. Math. Comput., vol. 162, no. 3, pp. 1391-1396, 2005.
-
(2005)
Appl. Math. Comput.
, vol.162
, Issue.3
, pp. 1391-1396
-
-
Yanga, C.-C.1
Wang, R.-C.2
Chang, T.-Y.3
-
13
-
-
26844467695
-
Security enhancement for password authentication schemes with smart cards
-
E.-J. Yoon, W.-H. Kim, and K.-Y. Yoo, "Security enhancement for password authentication schemes with smart cards," in Proc. TrustBus, 2005, pp. 311-320.
-
(2005)
Proc. TrustBus
, pp. 311-320
-
-
Yoon, E.-J.1
Kim, W.-H.2
Yoo, K.-Y.3
-
14
-
-
0036167785
-
Cryptanalysis of timestamp-based password authentication scheme
-
C.-K. Chan and L.-M. Cheng, "Cryptanalysis of timestamp-based password authentication scheme," Comput. Security, vol. 21, no. 1, pp. 74-76, 2002.
-
(2002)
Comput. Security
, vol.21
, Issue.1
, pp. 74-76
-
-
Chan, C.-K.1
Cheng, L.-M.2
-
15
-
-
85007377325
-
Cryptanalysis of timestamp-based password authentication schemes using smart cards
-
G. Wang and F. Bao, "Cryptanalysis of timestamp-based password authentication schemes using smart cards," in Proc. ICICS, 2006, pp. 399-409.
-
(2006)
Proc. ICICS
, pp. 399-409
-
-
Wang, G.1
Bao, F.2
-
16
-
-
23344449693
-
ID-based password authentication scheme using smart cards and fingerprints
-
Oct
-
H.-S. Kim, S.-W. Lee, and K.-Y. Yoo, "ID-based password authentication scheme using smart cards and fingerprints," SIGOPS Oper. Syst. Rev., vol. 37, no. 4, pp. 32-41, Oct. 2003.
-
(2003)
SIGOPS Oper. Syst. Rev.
, vol.37
, Issue.4
, pp. 32-41
-
-
Kim, H.-S.1
Lee, S.-W.2
Yoo, K.-Y.3
-
17
-
-
33645758252
-
Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints
-
Apr
-
M. Scott, "Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints," SIGOPS Oper. Syst. Rev., vol. 38, no. 2, pp. 73-75, Apr. 2004.
-
(2004)
SIGOPS Oper. Syst. Rev.
, vol.38
, Issue.2
, pp. 73-75
-
-
Scott, M.1
-
18
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
Jun
-
U. Uludag, S. Pankanti, A. K. Jain, and S. Prabhakar, "Biometric cryptosystems: Issues and challenges," Proc. IEEE, vol. 92, no. 6, pp. 948-960, Jun. 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
Prabhakar, S.4
-
20
-
-
34249885740
-
Privacy preserving multi-factor authentication with biometrics
-
A. Bhargav-Spantzel, A. C. Squicciarini, and E. Bertino, "Privacy preserving multi-factor authentication with biometrics," in Proc. Digital Identity Manage., 2006, pp. 63-72.
-
(2006)
Proc. Digital Identity Manage
, pp. 63-72
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.C.2
Bertino, E.3
-
21
-
-
34547519982
-
Privacy preserving multi-factor authentication with biometrics
-
A. Bhargav-Spantzel, A. C. Squicciarini, S. K. Modi, M. Young, E. Bertino, and S. J. Elliott, "Privacy preserving multi-factor authentication with biometrics," J. Comput. Security, vol. 15, no. 5, pp. 529-560, 2007.
-
(2007)
J. Comput. Security
, vol.15
, Issue.5
, pp. 529-560
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.C.2
Modi, S.K.3
Young, M.4
Bertino, E.5
Elliott, S.J.6
-
22
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Berlin, Germany: Springer-Verlag
-
T. P. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1991, pp. 129-140.
-
(1991)
Advances in Cryptology
, pp. 129-140
-
-
Pedersen, T.P.1
-
23
-
-
70450285606
-
Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics
-
Dec
-
C.-I. Fan and Y.-H. Lin, "Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 933-945, Dec. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.4
, pp. 933-945
-
-
Fan, C.-I.1
Lin, Y.-H.2
-
24
-
-
84859300639
-
Satisfying privacy requirements before data anonymization
-
X. Sun, H. Wang, J. Li, and Y. Zhang, "Satisfying privacy requirements before data anonymization," Comput. J., vol. 55, no. 4, pp. 422-437, 2012.
-
(2012)
Comput. J.
, vol.55
, Issue.4
, pp. 422-437
-
-
Sun, X.1
Wang, H.2
Li, J.3
Zhang, Y.4
-
25
-
-
84872696068
-
Privacy preserving data sharing with anonymous ID assignment
-
Feb
-
L. A. Dunning and R. Kresman, "Privacy preserving data sharing with anonymous ID assignment," IEEE Trans. Inf. Forensics Security, vol. 8, no. 2, pp. 402-413, Feb. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.2
, pp. 402-413
-
-
Dunning, L.A.1
Kresman, R.2
-
26
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
Jan
-
C.-T. Li and M.-S. Hwang, "An efficient biometrics-based remote user authentication scheme using smart cards," J. Netw. Comput. Appl., vol. 33, no. 1, pp. 1-5, Jan. 2010.
-
(2010)
J. Netw. Comput. Appl.
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.-T.1
Hwang, M.-S.2
-
27
-
-
78649335192
-
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
-
X. Li, J.-W. Niu, J. Ma, W.-D. Wang, and C.-L. Liu, "Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards," J. Netw. Comput. Appl., vol. 34, no. 1, pp. 73-79, 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 73-79
-
-
Li, X.1
Niu, J.-W.2
Ma, J.3
Wang, W.-D.4
Liu, C.-L.5
-
28
-
-
84860585173
-
Cryptanalysis and further improvement of a biometric-based remote user authentication scheme using smart cards
-
A. K. Das, "Cryptanalysis and further improvement of a biometric-based remote user authentication scheme using smart cards," Int. J. Netw. Security Appl., vol. 3, no. 2, pp. 13-28, 2011.
-
(2011)
Int. J. Netw. Security Appl.
, vol.3
, Issue.2
, pp. 13-28
-
-
Das, A.K.1
-
29
-
-
79959689122
-
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
-
Aug
-
X. Huang, Y. Xiang, A. Chonka, J. Zhou, and R. H. Deng, "A generic framework for three-factor authentication: Preserving security and privacy in distributed systems," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 8, pp. 1390-1397, Aug. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.8
, pp. 1390-1397
-
-
Huang, X.1
Xiang, Y.2
Chonka, A.3
Zhou, J.4
Deng, R.H.5
-
30
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Berlin, Germany: Springer-Verlag
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2004, pp. 523-540.
-
(2004)
Advances in Cryptology
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
31
-
-
78349280706
-
Transforming a pattern identifier into biometric key generators
-
Jul
-
Y. Wu and B. Qiu, "Transforming a pattern identifier into biometric key generators," in Proc. IEEE ICME, Jul. 2010, pp. 78-82.
-
(2010)
Proc. IEEE ICME
, pp. 78-82
-
-
Wu, Y.1
Qiu, B.2
-
32
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
D. He, M. Ma, Y. Zhang, C. Chen, and J. Bu, "A strong user authentication scheme with smart cards for wireless communications," Comput. Commun., vol. 34, no. 3, pp. 367-374, 2011.
-
(2011)
Comput. Commun.
, vol.34
, Issue.3
, pp. 367-374
-
-
He, D.1
Ma, M.2
Zhang, Y.3
Chen, C.4
Bu, J.5
-
33
-
-
77957941531
-
Securing fingerprint template: Fuzzy vault with minutiae descriptors
-
Dec
-
A. Nagar, K. Nandakumar, and A. K. Jain, "Securing fingerprint template: Fuzzy vault with minutiae descriptors," in Proc. 19th Int. Conf. Pattern Recognit., Dec. 2008, pp. 1-4.
-
(2008)
Proc. 19th Int. Conf. Pattern Recognit
, pp. 1-4
-
-
Nagar, A.1
Nandakumar, K.2
Jain, A.K.3
-
34
-
-
84937704662
-
Secure smartcardbased fingerprint authentication
-
T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcardbased fingerprint authentication," in Proc. ACM Workshop Biometrics, Methods Appl., 2003, pp. 45-52.
-
(2003)
Proc. ACM Workshop Biometrics, Methods Appl
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
35
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
Dec
-
K. Nandakumar, A. K. Jain, and S. Pankanti, "Fingerprint-based fuzzy vault: Implementation and performance," IEEE Trans. Inf. Forensics Security, vol. 2, no. 4, pp. 744-757, Dec. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.3
-
36
-
-
33845532978
-
Securing fingerprint template: Fuzzy vault with helper data
-
Jun
-
U. Uludag and A. Jain, "Securing fingerprint template: Fuzzy vault with helper data," in Proc. CVPR Workshop, Jun. 2006, p. 163.
-
(2006)
Proc. CVPR Workshop
, pp. 163
-
-
Uludag, U.1
Jain, A.2
-
38
-
-
34548048416
-
Combining minutiae descriptors for fingerprint matching
-
J. Feng, "Combining minutiae descriptors for fingerprint matching," Pattern Recognit., vol. 41, no. 1, pp. 342-352, 2008.
-
(2008)
Pattern Recognit.
, vol.41
, Issue.1
, pp. 342-352
-
-
Feng, J.1
-
39
-
-
51249124719
-
Secure biometric template protection via randomized dynamic quantization transformation
-
Apr
-
A. Teoh and S. O. Thian, "Secure biometric template protection via randomized dynamic quantization transformation," in Proc. IEEE Int. Symp. Biometrics Security Technol., Apr. 2008, pp. 1-6.
-
(2008)
Proc. IEEE Int. Symp. Biometrics Security Technol
, pp. 1-6
-
-
Teoh, A.1
Thian, S.O.2
-
40
-
-
44049084315
-
Template-free biometric-key generation by means of fuzzy genetic clustering
-
Jun
-
W. Sheng, G. Howells, M. Fairhurst, and F. Deravi, "Template-free biometric-key generation by means of fuzzy genetic clustering," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 183-191, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.2
, pp. 183-191
-
-
Sheng, W.1
Howells, G.2
Fairhurst, M.3
Deravi, F.4
-
41
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
Nov
-
G. Yang, D. S. Wong, H. Wang, and X. Deng, "Two-factor mutual authentication based on smart cards and passwords," J. Comput. Syst. Sci., vol. 74, no. 7, pp. 1160-1172, Nov. 2008.
-
(2008)
J. Comput. Syst. Sci.
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.S.2
Wang, H.3
Deng, X.4
-
42
-
-
84945119254
-
Entity authentication and key distribution
-
Berlin, Germany: Springer-Verlag
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1993, pp. 232-249.
-
(1993)
Advances in Cryptology
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
43
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Berlin, Germany: Springer-Verlag
-
R. Canetti and H. Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2001, pp. 453-474.
-
(2001)
Advances in Cryptology
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
44
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Berlin, Germany: Springer-Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2000, pp. 139-155.
-
(2000)
Advances in Cryptology
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
45
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
J. Xu, W.-T. Zhu, and D.-G. Feng, "An improved smart card based password authentication scheme with provable security," Comput. Standards Inter., vol. 31, no. 4, pp. 723-728, 2009.
-
(2009)
Comput. Standards Inter.
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.-T.2
Feng, D.-G.3
-
46
-
-
80051485094
-
A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card
-
J. Xu, W.-T. Zhu, and W. Jin, "A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card," Concurrency Comput., Pract. Exper., vol. 23, no. 12, pp. 1386-1398, 2011.
-
(2011)
Concurrency Comput., Pract. Exper.
, vol.23
, Issue.12
, pp. 1386-1398
-
-
Xu, J.1
Zhu, W.-T.2
Jin, W.3
-
47
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, and R. L. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks," SIAM J. Comput., vol. 17, no. 2, pp. 281-308, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
|