A generic framework for three-factor authentication: Preserving security and privacy in distributed systems

X Huang, Y Xiang, A Chonka, J Zhou… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
As part of the security within distributed systems, various services and resources need
protection from unauthorized use. Remote authentication is the most commonly used …

Three‐factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices

CC Lee, CT Chen, PH Wu… - IET Computers & Digital …, 2013 - Wiley Online Library
This study proposes a three‐factor control protocol for universal serial bus (USB) on an
elliptic curve cryptosystem (ECC). USB is a universal interface used in an enormous number …

Chaotic secure content-based hidden transmission of biometric templates

MK Khan, J Zhang, L Tian - Chaos, Solitons & Fractals, 2007 - Elsevier
The large-scale proliferation of biometric verification systems creates a demand for effective
and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is …

Beyond pki: The biocryptographic key infrastructure

W Scheirer, B Bishop, T Boult - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
Public Key Infrastructure is a widely deployed security technology for handling key
distribution and validation in computer security. Despite PKI's popularity as a security …

A lightweight pseudonym authentication and key agreement protocol for multi-medical server architecture in TMIS

X Liu, Y Li, J Qu, Y Ding - … on Internet and Information Systems (TIIS …, 2017 - koreascience.kr
Abstract Telecare Medical Information System (TMIS) helps the patients to gain the health
monitoring information at home and access medical services over the mobile Internet. In …

Palm Vein Imaging Enhancement in Highly Reflective Hand Scenarios

S Sun, F Chen, K Xia - 2023 8th International Conference on …, 2023 - ieeexplore.ieee.org
Palm vein recognition is an emerging biometric recognition technology that has received
significant attention in recent years. However, we have discovered that in some challenging …

Implementation of 3-Level Security System Using Image Grid Based Authentication System

A Kiran, BB Sujitha, P Vijayakarthik… - 2023 International …, 2023 - ieeexplore.ieee.org
We now know that the majority of computer security relies on passwords to verify and
authenticate users. There are numerous proposed authentication methods, and the majority …

[PDF][PDF] On the generation of x. 509v3 certificates with biometric information

G Martınez-Silva… - Security and …, 2007 - mcs.csueastbay.edu
We present the kernel implementation of a Mobile Certification Authority (MCA). Our MCA
kernel is able to issue digital certificates fully-complying with the X. 509v3 standard; it …

Biometric authentication and authorisation infrastructures

M Olden - 2010 - epub.uni-regensburg.de
Nowadays, replacing traditional authentication methods with authentication and
authorization infrastructures (AAIs) comes down to trading several passwords for one master …

Secure ad-hoc mBusiness: Enhancing WindowsCE security

F Alménarez, D Díaz, A Marín - Trust and Privacy in Digital Business: First …, 2004 - Springer
Nowadays we can perform business transactions with remote servers interconnected to
Internet using our personal devices. These transactions can also be possible without any …