2008
DOI: 10.1016/j.chaos.2006.05.061
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
112
0
1

Year Published

2010
2010
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 159 publications
(113 citation statements)
references
References 15 publications
0
112
0
1
Order By: Relevance
“…Of late many authentication protocols based on combined smart card-biometric system have been proposed [7], [8], [9], [10], [11] answering both the questions like "Who am I?" and "Am I really the person who is proceeding"?…”
Section: Related Research Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Of late many authentication protocols based on combined smart card-biometric system have been proposed [7], [8], [9], [10], [11] answering both the questions like "Who am I?" and "Am I really the person who is proceeding"?…”
Section: Related Research Workmentioning
confidence: 99%
“…While the second question addresses the verification or authentication, it allows permission to the person claiming access or defending against illegitimate accessing or forgery attack. The implementation of these protocols [8], [10], [11] in RFID systems will depend on the availability of computer resources (memory, complexity, performance). Recent past have demonstrated a few innovative blends of RFID and biometry system, which ushers in further horizons of advanced research.…”
Section: Related Research Workmentioning
confidence: 99%
See 1 more Smart Citation
“…제안 기법 Jang-L ee [6] WangLi [8] YoonYoo [9] Khan et al [10] 등록단계 2Th 3Th 3Th 3Th 2Th 로그인 3Th 2Th 2Th 3Th 2Th 인증단계 6Th 4Th 5Th 4Th 2Th …”
Section: 구분unclassified
“…In this section, we will analyze the security of the proposed BAKA protocol and further compare Lin-Lai's protocol [2], Lee-Chiu's protocol [3] [7], Li-Hwang's protocol [8], and our BAKA protocol in terms of functionality and efficiency.…”
Section: Performance Analysis and Comparisonsmentioning
confidence: 99%