Abstract. Biometric authentication establishes the identity of an individual based on biometric tem-plates (i.e. fingerprints, retina scans etc.). Although biometric authentication has important advantages and many applications, it also raises serious security and privacy concerns. In this parer, we investigate a privacy-preserving biometric authentication protocol that has been proposed by Bringer et al. and adopts a distributed architecture (i.e. multiple entities are involved in the authentication process). We present an attack algorithm that can be employed to mount a number of attacks on the protocol under investigation and propose an improved version of the Bringer et al. protocol that combats the presented attacks
We propose a privacy preserving biometrics-based authentication protocol by which users can authenti...
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenari...
OA-julkaisu. Lisää artikkeli, kun julkaistu.In order to overcome the difficulty of password manageme...
Biometric authentication establishes the identity of an individual based on biometric templates (i.e...
Biometric authentication establishes the identity of an individual based on biometric templates (e.g...
An emerging direction for authenticating people is the adoption of biometric authentication systems....
Biometric Authentication Protocols (BAPs) have increasingly been employed to guarantee reliable acce...
Abstract. Biometric authentication over public networks leads to a variety of privacy issues that ne...
In the digital and interconnected world we live in, establishing the identity of any individual is ...
An emerging direction for authenticating people is the adoption of biometric authentication systems....
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols with re...
© Springer International Publishing AG 2016. User authentication based on biometrics is getting an i...
In this paper we analyze two types of biometric identification systems with protected templates that...
A serious concern in the design and use of biometric authentication systems is the privacy protectio...
We propose a new hybrid protocol for cryptographically secure biometric authentication. The main adv...
We propose a privacy preserving biometrics-based authentication protocol by which users can authenti...
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenari...
OA-julkaisu. Lisää artikkeli, kun julkaistu.In order to overcome the difficulty of password manageme...
Biometric authentication establishes the identity of an individual based on biometric templates (i.e...
Biometric authentication establishes the identity of an individual based on biometric templates (e.g...
An emerging direction for authenticating people is the adoption of biometric authentication systems....
Biometric Authentication Protocols (BAPs) have increasingly been employed to guarantee reliable acce...
Abstract. Biometric authentication over public networks leads to a variety of privacy issues that ne...
In the digital and interconnected world we live in, establishing the identity of any individual is ...
An emerging direction for authenticating people is the adoption of biometric authentication systems....
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols with re...
© Springer International Publishing AG 2016. User authentication based on biometrics is getting an i...
In this paper we analyze two types of biometric identification systems with protected templates that...
A serious concern in the design and use of biometric authentication systems is the privacy protectio...
We propose a new hybrid protocol for cryptographically secure biometric authentication. The main adv...
We propose a privacy preserving biometrics-based authentication protocol by which users can authenti...
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenari...
OA-julkaisu. Lisää artikkeli, kun julkaistu.In order to overcome the difficulty of password manageme...