2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2014
DOI: 10.1109/icacci.2014.6968299
|View full text |Cite
|
Sign up to set email alerts
|

An approach to cryptographic key distribution through fingerprint based key distribution center

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…The comparison is given in Table 3. Among the systems, only a few systems 10,18,37 along with the proposed scheme store biometric template in a database of servers. Our proposed scheme and 10,37 support online biometric template updating even in a multi-party environment.…”
Section: Comparison With Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The comparison is given in Table 3. Among the systems, only a few systems 10,18,37 along with the proposed scheme store biometric template in a database of servers. Our proposed scheme and 10,37 support online biometric template updating even in a multi-party environment.…”
Section: Comparison With Related Workmentioning
confidence: 99%
“…Among the systems, only a few systems 10,18,37 along with the proposed scheme store biometric template in a database of servers. Our proposed scheme and 10,37 support online biometric template updating even in a multi-party environment. Moreover, our proposed scheme also supports the online update of the cryptographic key when it is locked by the biometric template of the user under a fuzzy commitment scheme.…”
Section: Comparison With Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Alternative methods have been used, including key generation through biometric authentication and hashing. [5]. In this approach, keys are generated based on biometrics and combined with the SHA256 hash function.…”
mentioning
confidence: 99%