Abstract. Biometric authentication establishes the identity of an individual based on biometric tem-plates (i.e. fingerprints, retina scans etc.). Although biometric authentication has important advantages and many applications, it also raises serious security and privacy concerns. In this parer, we investigate a privacy-preserving biometric authentication protocol that has been proposed by Bringer et al. and adopts a distributed architecture (i.e. multiple entities are involved in the authentication process). We present an attack algorithm that can be employed to mount a number of attacks on the protocol under investigation and propose an improved version of the Bringer et al. protocol that combats the presented attacks
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols with re...
© Springer International Publishing AG 2016. User authentication based on biometrics is getting an i...
In this paper we analyze two types of biometric identification systems with protected templates that...
Biometric authentication establishes the identity of an individual based on biometric templates (i.e...
Biometric authentication establishes the identity of an individual based on biometric templates (i.e...
Biometric authentication establishes the identity of an individual based on biometric templates (e.g...
Abstract. Biometric authentication establishes the identity of an indi-vidual based on biometric tem...
An emerging direction for authenticating people is the adoption of biometric authentication systems....
An emerging direction for authenticating people is the adoption of biometric authentication systems....
Biometric Authentication Protocols (BAPs) have increasingly been employed to guarantee reliable acce...
Abstract. Biometric authentication over public networks leads to a variety of privacy issues that ne...
In the digital and interconnected world we live in, establishing the identity of any individual is ...
An emerging direction for authenticating people is the adoption of biometric authentication systems....
In the digital and interconnected world we live in, establishing the identity of any individual is ...
In the digital and interconnected world we live in, establishing the identity of any individual is ...
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols with re...
© Springer International Publishing AG 2016. User authentication based on biometrics is getting an i...
In this paper we analyze two types of biometric identification systems with protected templates that...
Biometric authentication establishes the identity of an individual based on biometric templates (i.e...
Biometric authentication establishes the identity of an individual based on biometric templates (i.e...
Biometric authentication establishes the identity of an individual based on biometric templates (e.g...
Abstract. Biometric authentication establishes the identity of an indi-vidual based on biometric tem...
An emerging direction for authenticating people is the adoption of biometric authentication systems....
An emerging direction for authenticating people is the adoption of biometric authentication systems....
Biometric Authentication Protocols (BAPs) have increasingly been employed to guarantee reliable acce...
Abstract. Biometric authentication over public networks leads to a variety of privacy issues that ne...
In the digital and interconnected world we live in, establishing the identity of any individual is ...
An emerging direction for authenticating people is the adoption of biometric authentication systems....
In the digital and interconnected world we live in, establishing the identity of any individual is ...
In the digital and interconnected world we live in, establishing the identity of any individual is ...
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols with re...
© Springer International Publishing AG 2016. User authentication based on biometrics is getting an i...
In this paper we analyze two types of biometric identification systems with protected templates that...