Designing a Bio-Capsule Secure Authentication System
نویسندگان
چکیده
منابع مشابه
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملBio-Authentication based Secure Transmission System using Steganography
— Biometrics deals with identity verification of an individual by using certain physiological or behavioral features associated with a person. Biometric identification systems using fingerprints patterns are called AFIS (Automatic Fingerprint Identification System). In this paper a composite method for Fingerprint recognition is considered using a combination of Fast Fourier Transform (FFT) and...
متن کاملSecure Comparator: a ZKP-Based Authentication System
Being a secret, it’s best protected when it never leaves the safe zone. Proving identity involves communicating the secret to another party, which eventually exposes the whole or a part of the secret, in a direct or indirect (hashed) form. In the real world, authentication traffic passes thousands of systems between a prover (you) and a verifier (an entity which eventually decides whether your ...
متن کاملBASE: a Proposed Secure Biometric Authentication System
The use of biometrics as a secure remote authentication mechanism is hindered by a series of issues. In the case of fingerprints, an attacker can make physical copies of fingerprints by ‘lifting’ latent fingerprints off a non-porous surface. These lifted fingerprints can be used to illegitimately gain access to an authentication system. Password authentication systems only accept passwords that...
متن کاملDesigning a Secure Smart Card Operating System
The ever-increasing computational power of smart cards has made them feasible for applications like electronic passports and military id cards. However, these applications require a secure smart card operating system. In this paper we argue that smart card platforms pose additional security challenges than traditional computer platforms. We discuss our design for a secure smart card operating s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Technology & Software Engineering
سال: 2015
ISSN: 2165-7866
DOI: 10.4172/2165-7866.1000138