-
1
-
-
0742290133
-
An introduction to biometric recognition
-
Jan.
-
A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition," IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 4-20, Jan. 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol.
, vol.14
, Issue.1
, pp. 4-20
-
-
Jain, A.K.1
Ross, A.2
Prabhakar, S.3
-
2
-
-
1342275940
-
-
New York NY USA: Springer- Verlag
-
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. New York, NY, USA: Springer-Verlag, 2009.
-
(2009)
Handbook of Fingerprint Recognition
-
-
Maltoni, D.1
Maio, D.2
Jain, A.K.3
Prabhakar, S.4
-
3
-
-
0742302036
-
Biometric recognition: Security and privacy concerns
-
Mar./Apr.
-
S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric recognition: Security and privacy concerns," IEEE Security Privacy Mag., vol. 1, no. 2, pp. 33-42, Mar./Apr. 2003.
-
(2003)
IEEE Security Privacy Mag.
, vol.1
, Issue.2
, pp. 33-42
-
-
Prabhakar, S.1
Pankanti, S.2
Jain, A.K.3
-
4
-
-
84886048482
-
Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement
-
X. Li, J. Niu, and M. K. Khan, "Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement," in Proc. IEEE Int. Symp. Biometr. Security Technol., 2013, pp. 105-110.
-
(2013)
Proc. IEEE Int. Symp. Biometr. Security Technol.
, pp. 105-110
-
-
Li, X.1
Niu, J.2
Khan, M.K.3
-
6
-
-
79951803930
-
A new biometric identity based encryption scheme secure against DoS attacks
-
Jan.
-
N. D. Sarier, "A new biometric identity based encryption scheme secure against DoS attacks," Security Commun. Netw., vol. 4, no. 1, pp. 23-32, Jan. 2011.
-
(2011)
Security Commun. Netw.
, vol.4
, Issue.1
, pp. 23-32
-
-
Sarier, N.D.1
-
7
-
-
38149029815
-
A biometric identity based signature scheme
-
A. Burnett, F. Byrne, T. Dowling, and A. Duffy, "A biometric identity based signature scheme," Int. J. Netw. Security, vol. 5, no. 3, pp. 317-326, 2007.
-
(2007)
Int. J. Netw. Security
, vol.5
, Issue.3
, pp. 317-326
-
-
Burnett, A.1
Byrne, F.2
Dowling, T.3
Duffy, A.4
-
8
-
-
84883342599
-
An efficient biometric identity based signature scheme
-
Aug.
-
Y. Yang, Y. Hu, and L. Zhang, "An efficient biometric identity based signature scheme," KSII Trans. Internet Inf. Syst., vol. 7, no. 8, pp. 2010-2026, Aug. 2013.
-
(2013)
KSII Trans. Internet Inf. Syst.
, vol.7
, Issue.8
, pp. 2010-2026
-
-
Yang, Y.1
Hu, Y.2
Zhang, L.3
-
9
-
-
80052796255
-
A biometric identity-based signcryption scheme
-
Jan.
-
F. Li and M. K. Khan, "A biometric identity-based signcryption scheme," Future Gener. Comput. Syst., vol. 28, no. 1, pp. 306-310, Jan. 2012.
-
(2012)
Future Gener. Comput. Syst.
, vol.28
, Issue.1
, pp. 306-310
-
-
Li, F.1
Khan, M.K.2
-
10
-
-
84896693645
-
A bovel biometric signcryption scheme that is identity-based and group-oriented
-
M. Wang and D. Tang, "A bovel biometric signcryption scheme that is identity-based and group-oriented," Appl. Math. Inf. Sci., vol. 6, no. 3S, pp. 849-854, 2012.
-
(2012)
Appl. Math. Inf. Sci.
, vol.6
, Issue.3 S
, pp. 849-854
-
-
Wang, M.1
Tang, D.2
-
11
-
-
0037030525
-
Fingerprint-based remote user authentication scheme using smart cards
-
J.-K. Lee, S.-R. Ryu, and K.-Y. Yoo, "Fingerprint-based remote user authentication scheme using smart cards," Electron. Lett., vol. 38, no. 12, pp. 554-555, 2002.
-
(2002)
Electron. Lett.
, vol.38
, Issue.12
, pp. 554-555
-
-
Lee, J.-K.1
Ryu, S.-R.2
Yoo, K.-Y.3
-
12
-
-
4043139259
-
A flexible biometrics remote user authentication scheme
-
Nov.
-
C.-H. Lin and Y.-Y. Lai, "A flexible biometrics remote user authentication scheme," Comput. Standards & Interfaces, vol. 27, no. 1, pp. 19-23, Nov. 2004.
-
(2004)
Comput. Standards & Interfaces
, vol.27
, Issue.1
, pp. 19-23
-
-
Lin, C.-H.1
Lai, Y.-Y.2
-
13
-
-
33645767442
-
Remarks on fingerprint-based remote user authentication scheme using smart cards
-
Oct.
-
C.-C. Chang and I.-C. Lin, "Remarks on fingerprint-based remote user authentication scheme using smart cards," ACM SIGOPS Oper. Syst. Rev., vol. 38, no. 4, pp. 91-96, Oct. 2004.
-
(2004)
ACM SIGOPS Oper. Syst. Rev.
, vol.38
, Issue.4
, pp. 91-96
-
-
Chang, C.-C.1
Lin, I.-C.2
-
14
-
-
23344449693
-
ID-based password authentication scheme using smart cards and fingerprints
-
Oct.
-
H.-S. Kim, S.-W. Lee, and K.-Y. Yoo, "ID-based password authentication scheme using smart cards and fingerprints," ACM SIGOPS Oper. Syst. Rev., vol. 37, no. 4, pp. 32-41, Oct. 2003.
-
(2003)
ACM SIGOPS Oper. Syst. Rev.
, vol.37
, Issue.4
, pp. 32-41
-
-
Kim, H.-S.1
Lee, S.-W.2
Yoo, K.-Y.3
-
15
-
-
33645758252
-
Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints
-
Apr.
-
M. Scott, "Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints," ACM SIGOPS Oper. Syst. Rev., vol. 38, no. 2, pp. 73-75, Apr. 2004.
-
(2004)
ACM SIGOPS Oper. Syst. Rev.
, vol.38
, Issue.2
, pp. 73-75
-
-
Scott, M.1
-
16
-
-
33751167604
-
Improving the security of 'a flexible biometrics remote user authentication scheme
-
Jan.
-
M.-K. Khan and J.-S. Zhang, "Improving the security of 'a flexible biometrics remote user authentication scheme," Comput. Standards Interfaces, vol. 29, no. 1, pp. 82-85, Jan. 2007.
-
(2007)
Comput. Standards Interfaces
, vol.29
, Issue.1
, pp. 82-85
-
-
Khan, M.-K.1
Zhang, J.-S.2
-
17
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
Jan.
-
C.-T. Li and M.-S. Hwang, "An efficient biometrics-based remote user authentication scheme using smart cards," J. Netw. Comput. Appl., vol. 33, no. 1, pp. 1-5, Jan. 2010.
-
(2010)
J. Netw. Comput. Appl.
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.-T.1
Hwang, M.-S.2
-
18
-
-
78649335192
-
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
-
Jan.
-
X. Li, J. Niu, J. Ma, W. Wang, and C. Liu, "Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards," J. Netw. Comput. Appl., vol. 34, no. 1, pp. 73-79, Jan. 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 73-79
-
-
Li, X.1
Niu, J.2
Ma, J.3
Wang, W.4
Liu, C.5
-
19
-
-
81855227196
-
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
-
Sep.
-
A. K. Das, "Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards," IET Inf. Security, vol. 5, no. 3, pp. 145-151, Sep. 2011.
-
(2011)
IET Inf. Security
, vol.5
, Issue.3
, pp. 145-151
-
-
Das, A.K.1
-
20
-
-
79959689122
-
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
-
Aug.
-
X. Huang, Y. Xiang, A. Chonka, J. Zhou, and R. Deng, "A generic framework for three-factor authentication: Preserving security and privacy in distributed systems," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 8, pp. 1390-1397, Aug. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.8
, pp. 1390-1397
-
-
Huang, X.1
Xiang, Y.2
Chonka, A.3
Zhou, J.4
Deng, R.5
-
21
-
-
84872320813
-
Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem
-
Jan.
-
E. Yoon and K. Yoo, "Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem," J. Supercomput., vol. 63, no. 1, pp. 235-255, Jan. 2013.
-
(2013)
J. Supercomput.
, vol.63
, Issue.1
, pp. 235-255
-
-
Yoon, E.1
Yoo, K.2
-
22
-
-
84863921912
-
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme
-
H. Kim, W. Jeon, K. Lee, Y. Lee, and D. Won, "Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme," in Proc. Int. Conf. Comput. Sci. Appl., 2012, pp. 391-406.
-
(2012)
Proc. Int. Conf. Comput. Sci. Appl.
, pp. 391-406
-
-
Kim, H.1
Jeon, W.2
Lee, K.3
Lee, Y.4
Won, D.5
-
23
-
-
84902111117
-
Security flaws in a biometrics-based multi-server authentication with key agreement scheme
-
ePrint Archive. [Online] Available:
-
D. He, Security flaws in a biometrics-based multi-server authentication with key agreement scheme, Tech. Rep. 2011/365, ePrint Archive. [Online]. Available: Http://eprint.iacr.org/2011/365.pdf
-
Tech. Rep. 2011/365
-
-
He, D.1
-
24
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Proc. Int. Conf. Theory Appl. Cryptograph. Tech., 2004, pp. 523-540.
-
(2004)
Proc. Int. Conf. Theory Appl. Cryptograph. Tech.
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
25
-
-
0025386404
-
A logic of authentication
-
Feb.
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Trans. Comput. Syst., vol. 8, no. 1, pp. 18-36, Feb. 1990.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
26
-
-
84939573910
-
Differential power analysis
-
J. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Proc. Adv. CRYPTO, 1999, pp. 388-397.
-
(1999)
Proc. Adv. CRYPTO
, pp. 388-397
-
-
Kocher, J.1
Jaffe, J.2
Jun, B.3
-
27
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
May
-
T. Messerges, E. Dabbish, and R. Sloan, "Examining smart-card security under the threat of power analysis attacks," IEEE Trans. Comput., vol. 51, no. 5, pp. 541-552, May 2002.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.1
Dabbish, E.2
Sloan, R.3
|