Generate an Encryption Key by using Biometric Cryptosystems to secure transferring of Data over a Network

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Generate an Encryption Key by using Biometric Cryptosystems to secure transferring of Data over a Network

Our modern day era faces an inevitable problem of securing our most integrated data and messages. The chief problem is to protect our data in a unique way that could only be worked upon by the sender and the recipient. Most of the traditional techniques probably in-use today, emphasizes on keys that are generated by generic function, algorithms or in random key generators. But question remains ...

متن کامل

a cca2-secure incomparable public key encryption scheme

in 2003, waters, felten and sahai introduced a novel cryptographic primitive called incomparable public key cryptosystem to protect anonymity of message receivers in an untrusted network. in this setting, a receiver is allowed to create many anonymous identities for himself without divulging the fact that all these identities refer to the same receiver. recently, lee and lim improved the soluti...

متن کامل

Secure End to End Data Aggregation using Public Key Encryption in Wireless Sensor Network

Wireless Sensor Networks is made of a large number of lowcost and low power sensor nodes that contains strictly limited sensing, computation, as well as communication abilities. Because of resource restricted sensor nodes, it is very important to reduce the amount of data transmission so the average sensor lifespan and also the total bandwidth utilization are generally increased. Data aggregati...

متن کامل

Biometric cryptosystems: authentication, encryption and signature for biometric identities

Zusammenfassung) Biometrics have been used for secure identification and authentication for more than two decades since biometric data is unique, non-transferable, unforgettable, and always with us. Recently, biometrics has pervaded other aspects of security applications that can be listed under the topic of “Biometric Cryptosystems”. Although the security of some of these systems is questionab...

متن کامل

A Novel Data Encryption Technique by Genetic Crossover of Robust Biometric Key and Session Based Password

In Fingerprint based Biometric authentication image of the fingerprint can be scanned and can be used later on for the purpose of authentication. So this process does not provide very high security. This paper proposes another level of security by using the concept of combined key. The key is obtained by crossing over of the Session key generated from the password given by the legitimate user a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IOSR Journal of Computer Engineering

سال: 2013

ISSN: 2278-8727,2278-0661

DOI: 10.9790/0661-1211622