An Authentication Protocol Based on Combined RFID-Biometric System

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System

Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, ...). Our work focuses on the design of a RFID authentication protocol which uses biometric data and which confirms ...

متن کامل

Combined RFID-Biometric based MIS forStudent Information

RFID (Radio Frequency Identifier) and Biometric now a days are one of the most popular technologies in use today. This paper focuses on creating a MIS (Management Information S ystem) system of student using both RFID and biometric (face-detection) technology. With the increasing number of students managing the attendance manually becomes a tedious and risky job. With the evolution in technolog...

متن کامل

Biometric Authentication System based on Iris Patterns

In the present age of digital impersonation, biometric techniques are being used increasingly to prevaricate against identity thefts. Iris recognition is a proven, accurate means to identify people. Iris is regarded as the most reliable biometric feature in terms of its uniqueness and robustness. The objective of this work is to present a biometric authentication system for high security physic...

متن کامل

Cyclic group based mutual authentication protocol for RFID system

Widespread deployment of RFID system arises security and privacy concerns of users. There are several proposals are in the literature to avoid these concerns, but most of them provides reasonable privacy at the cost of search complexity on the server side. The search complexity increases linearly with the number of tags in the system. Some schemes use a group based approach to solve the search ...

متن کامل

An Efficient Authentication and Key Agreement Protocol in RFID System

Due to the very limited computing resource, storing space and electric power supply of tag, it is a great challenge for us to design a practical RFID protocol which is security, efficient and can be used in the low-cost tag. In 2007, He et al. proposed an authentication and key agreement protocol which is used in the process of communication between the low-cost tag and reader. They also proved...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2012

ISSN: 2158-107X,2156-5570

DOI: 10.14569/ijacsa.2012.030411