Deception With Side Information in Biometric Authentication Systems

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Protecting Biometric Authentication Systems Privacy Protecting Biometric Authentication Systems

Privacy Protecting Biometric Authentication Systems As biometrics gains popularity and proliferates into the daily life, there is an increased concern over the loss of privacy and potential misuse of biometric data held in central repositories. The major concerns are about i) the use of biometrics to track people, ii) non-revocability of biometrics (eg. if a fingerprint is compromised it can no...

متن کامل

Improving Computer Authentication Systems with Biometric Technologies

In this paper we describe that user authentication methods based on hash functions like MD5, NT / NTLM and SHA-1 can be easily compromised. We used methods that utilize cryptanalytic tables based on time memory tradeoff procedures (TMTO) and we analyzed certain limitations on this approach. We suggest improvements to this technique and additional concepts like parallelized creation and querying...

متن کامل

Biometric Systems for User Authentication

Authenticating the identity of users is a critical issue in information security. Biometrics is known for recognizing users based on their physiological or behavioral traits as identifiers and these cannot be easily stolen unlike passwords or ID cards. Biometrics could be employed as the primary means for authentication, called user identification, as well as a complementary (secondary) method ...

متن کامل

Authentication Using Side-Channel Information

Authentication based on cryptographic protocols is a key technology for recent security systems. However, the so-called relay attack where a malicious attacker tries to assume the role of the prover, is known to be a serious threat even for the cryptographically-secure authentication systems. This paper proposes a new authentication method that utilizes the side channel that already exists in m...

متن کامل

A Survey of Distributed Biometric Authentication Systems

In ACISP’07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionality in order to detach the biometric data storage from the service provider. Besides, a new security model is defined using the notions of Identity and Transaction Privacy, which guarantees the privacy of the identity-biometri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Theory

سال: 2015

ISSN: 0018-9448,1557-9654

DOI: 10.1109/tit.2015.2389825