A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
As part of the security within distributed systems, various services and resources need
protection from unauthorized use. Remote authentication is the most commonly used …
protection from unauthorized use. Remote authentication is the most commonly used …
Three‐factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices
CC Lee, CT Chen, PH Wu… - IET Computers & Digital …, 2013 - Wiley Online Library
This study proposes a three‐factor control protocol for universal serial bus (USB) on an
elliptic curve cryptosystem (ECC). USB is a universal interface used in an enormous number …
elliptic curve cryptosystem (ECC). USB is a universal interface used in an enormous number …
Chaotic secure content-based hidden transmission of biometric templates
The large-scale proliferation of biometric verification systems creates a demand for effective
and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is …
and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is …
Beyond pki: The biocryptographic key infrastructure
W Scheirer, B Bishop, T Boult - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
Public Key Infrastructure is a widely deployed security technology for handling key
distribution and validation in computer security. Despite PKI's popularity as a security …
distribution and validation in computer security. Despite PKI's popularity as a security …
A lightweight pseudonym authentication and key agreement protocol for multi-medical server architecture in TMIS
X Liu, Y Li, J Qu, Y Ding - … on Internet and Information Systems (TIIS …, 2017 - koreascience.kr
Abstract Telecare Medical Information System (TMIS) helps the patients to gain the health
monitoring information at home and access medical services over the mobile Internet. In …
monitoring information at home and access medical services over the mobile Internet. In …
Palm Vein Imaging Enhancement in Highly Reflective Hand Scenarios
Palm vein recognition is an emerging biometric recognition technology that has received
significant attention in recent years. However, we have discovered that in some challenging …
significant attention in recent years. However, we have discovered that in some challenging …
Implementation of 3-Level Security System Using Image Grid Based Authentication System
A Kiran, BB Sujitha, P Vijayakarthik… - 2023 International …, 2023 - ieeexplore.ieee.org
We now know that the majority of computer security relies on passwords to verify and
authenticate users. There are numerous proposed authentication methods, and the majority …
authenticate users. There are numerous proposed authentication methods, and the majority …
[PDF][PDF] On the generation of x. 509v3 certificates with biometric information
G Martınez-Silva… - Security and …, 2007 - mcs.csueastbay.edu
We present the kernel implementation of a Mobile Certification Authority (MCA). Our MCA
kernel is able to issue digital certificates fully-complying with the X. 509v3 standard; it …
kernel is able to issue digital certificates fully-complying with the X. 509v3 standard; it …
Biometric authentication and authorisation infrastructures
M Olden - 2010 - epub.uni-regensburg.de
Nowadays, replacing traditional authentication methods with authentication and
authorization infrastructures (AAIs) comes down to trading several passwords for one master …
authorization infrastructures (AAIs) comes down to trading several passwords for one master …
Secure ad-hoc mBusiness: Enhancing WindowsCE security
Nowadays we can perform business transactions with remote servers interconnected to
Internet using our personal devices. These transactions can also be possible without any …
Internet using our personal devices. These transactions can also be possible without any …