2010
DOI: 10.1016/j.jnca.2009.12.017
|View full text |Cite
|
Sign up to set email alerts
|

Improving the accuracy and storage cost in biometric remote authentication schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…In 2010, Sarier et al [11] proposed a multi-factor protocol for allowing secure communication between two entities and establishing key agreement with server. Venkatasubramanian et al [12] presented a protocol for physiological signal-based key agreement for authenticated communication between neighbouring nodes in an MSN.…”
Section: Related Workmentioning
confidence: 99%
“…In 2010, Sarier et al [11] proposed a multi-factor protocol for allowing secure communication between two entities and establishing key agreement with server. Venkatasubramanian et al [12] presented a protocol for physiological signal-based key agreement for authenticated communication between neighbouring nodes in an MSN.…”
Section: Related Workmentioning
confidence: 99%
“…Two independent features from the same biometric are used in this research namely as morphological and statistical which combined and obtained the result an FAR of 0.3% and FRR of 0.54%. The research that has done by [5] is focus on remote biometric based verification. This research describe an efficient multi-factor biometric verification system with improve the accuracy and lower complexity by considering the range of information of every components of the user biometric separately.…”
Section: Research Backgroundmentioning
confidence: 99%
“…However, surprisingly, most schemes have been designed in a heuristic security approach, which just superficially examines the security against the existing well‐known attacks without any mathematical assumption and provably secure result. In fact, many schemes have been found to be flawed and repeatedly redesigned until the flaw has not been found any more .…”
Section: Introductionmentioning
confidence: 99%