메뉴 건너뛰기




Volumn , Issue , 2015, Pages 157-162

A new pre-authentication protocol in Kerberos 5: Biometric authentication

Author keywords

Authentication; biometric; cryptography; fingerprint; Kerberos

Indexed keywords

BIOMETRICS; CRYPTOGRAPHY; NETWORK SECURITY;

EID: 84925858093     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RIVF.2015.7049892     Document Type: Conference Paper
Times cited : (3)

References (18)
  • 1
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • September
    • C. Neuman and T. Tso, "Kerberos: an authentication service for computer networks, " IEEE Communications Magazine, vol. 32, no. 9, pp. 33-38, September 1994.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neuman, C.1    Tso, T.2
  • 2
    • 33750963358 scopus 로고    scopus 로고
    • The Kerberos network authentication service (V5)
    • July
    • C. Neuman, T. Yu, S. Hartman, and K. Raeburn, "The Kerberos network authentication service (V5), " IETF RFC 4120, July 2005.
    • (2005) IETF RFC , vol.4120
    • Neuman, C.1    Yu, T.2    Hartman, S.3    Raeburn, K.4
  • 4
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and improvements to, password security
    • D. V. Klein, "Foiling the cracker: a survey of, and improvements to, password security, " in Proc. 2nd USENIX Workshop Security, pp. 5-14, 1990.
    • (1990) Proc. 2nd USENIX Workshop Security , pp. 5-14
    • Klein, D.V.1
  • 5
    • 33747064900 scopus 로고    scopus 로고
    • Public-key cryptography extensions into Kerberos
    • December
    • Ian Downnard, "Public-key cryptography extensions into Kerberos, " IEEE Potentials, vol. 21, no. 5, pp. 34-38, December 2002.
    • (2002) IEEE Potentials , vol.21 , Issue.5 , pp. 34-38
    • Downnard, I.1
  • 6
    • 33845586530 scopus 로고    scopus 로고
    • Public key cryptography for initial authentication in kerberos
    • June
    • L. Zhu and B. Tung, "Public Key Cryptography for Initial Authentication in Kerberos, " IETF RFC 4556, June 2006.
    • (2006) IETF RFC , vol.4556
    • Zhu, L.1    Tung, B.2
  • 8
    • 84897807264 scopus 로고    scopus 로고
    • Biometric-kerberos authentication scheme for secure mobile computing services
    • September
    • Fengling Han, Mohammed Alkhathami, and Ron Van Schyndel, "Biometric-Kerberos Authentication Scheme for Secure Mobile Computing Services, " International Congress on Image and Signal Processing, vol. 3, pp. 1694-1698, September 2013.
    • (2013) International Congress on Image and Signal Processing , vol.3 , pp. 1694-1698
    • Han, F.1    Alkhathami, M.2    Van Schyndel, R.3
  • 12
    • 78049513630 scopus 로고    scopus 로고
    • Minutia cylinder-code: A new representation and matching technique for fingerprint recognition
    • December
    • R. Cappelli, M. Ferrara, and D. Maltoni, "Minutia Cylinder-Code: a new representation and matching technique for fingerprint recognition, " IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 12, pp. 2128-2141, December 2010.
    • (2010) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.32 , Issue.12 , pp. 2128-2141
    • Cappelli, R.1    Ferrara, M.2    Maltoni, D.3
  • 16
    • 78650512455 scopus 로고    scopus 로고
    • Fingerprint reconstruction: From minutiae to phase
    • Feb.
    • J. Feng and A. K. Jain, "Fingerprint reconstruction: From minutiae to phase, " IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 2, pp. 209-223, Feb. 2011.
    • (2011) IEEE Trans. Pattern Anal. Mach. Intell , vol.33 , Issue.2 , pp. 209-223
    • Feng, J.1    Jain, A.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.