Security and Cryptographic Challenges for Authentication Based on Biometrics Data

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security protocols for biometrics-based cardholder authentication in smartcards

The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the focus of this paper. In such a biometrics-based cardholder authentication system, sensitive data will typically need to be transferred between the smartcard and the card reader. We propose strategies to ensure integrity of the se...

متن کامل

Enhancing security and privacy in biometrics-based authentication systems

Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications su...

متن کامل

Authentication Based on Context and Behavioral Biometrics

Safelayer Secure Communications S.A. is a solution manufacturer of multi-factor authentication, PKI authentication and electronic signature C/ Basauri, 17 Edif. Valrealty Edif. B Pl. Baja Izq. 28023 Madrid World Trade Center (Edif. S-4), Moll de Barcelona S/N 08039 Barcelona +34 917080480 – Safelayer.com © C op yr ig ht 1 99 920 13 S af el ay er S ec ur e C om m un ic at io ns , S .A . A ll br ...

متن کامل

Network Security using Firewall and Cryptographic Authentication

The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consi...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cryptography

سال: 2018

ISSN: 2410-387X

DOI: 10.3390/cryptography2040039