Sciweavers

Share
635 search results - page 1 / 127
» Secure Remote Authentication Using Biometric Data
Sort
View
EUROCRYPT
2005
Springer
9 years 5 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
8 years 9 months ago
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password
This paper presents an entire chaos-based biometric remote user authentication scheme on tokens without using passwords. The proposed scheme is based on the chaotic hash function a...
Eun-Jun Yoon, Kee-Young Yoo
ICMI
2009
Springer
132views Biometrics» more  ICMI 2009»
9 years 6 months ago
Activity-aware ECG-based patient authentication for remote health monitoring
Mobile medical sensors promise to provide an efficient, accurate, and economic way to monitor patients’ health outside the hospital. Patient authentication is a necessary secur...
Janani C. Sriram, Minho Shin, Tanzeem Choudhury, D...
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
8 years 10 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier
CSI
2004
178views more  CSI 2004»
8 years 12 months ago
A flexible biometrics remote user authentication scheme
Recently, Lee, Ryu and Yoo proposed a fingerprint-based remote user authentication scheme by using smart cards and biometrics. Their scheme is based on two tiers of ElGamal's...
Chu-Hsing Lin, Yi-Yi Lai
books