Biometric Authentication Protocols (BAPs) have increasingly been employed to guarantee reliable access control to places and services. However, it is well-known that biometric traits contain sensitive information of individuals and if compromised could lead to serious security and privacy breaches. Yasuda et al. [23] proposed a distributed privacy-preserving BAP which Abidin et al. [1] have shown to be vulnerable to biometric template recovery attacks under the presence of a malicious computational server. In this paper, we fix the weaknesses of Yasuda et al.’s BAP and present a detailed instantiation of a distributed privacy-preserving BAP which is resilient against the attack presented in [1]. Our solution employs Backes et al.’s [4] veri...
Being unique and immutable for each person, biometric signals are widely used in access control syst...
Research Article published by International Journal of Advanced Technology and Engineering Explorati...
In this paper, we study the security of two recently proposed privacy-preserving biometric authentic...
Biometric authentication establishes the identity of an individual based on biometric templates (i.e...
Biometric authentication establishes the identity of an individual based on biometric templates (i.e...
Biometric authentication establishes the identity of an individual based on biometric templates (e.g...
Abstract. Biometric authentication establishes the identity of an individual based on biometric tem-...
Abstract. Biometric authentication establishes the identity of an indi-vidual based on biometric tem...
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols with re...
Systems employing biometric traits for people authentication and identification are witnessing growi...
Systems employing biometric traits for people authentication and identification are witnessing growi...
Systems employing biometric traits for people authentication and identification are witnessing growi...
Being unique and immutable for each person, biometric signals are widely used in access control syst...
Being unique and immutable for each person, biometric signals are widely used in access control syst...
© Springer International Publishing AG 2016. User authentication based on biometrics is getting an i...
Being unique and immutable for each person, biometric signals are widely used in access control syst...
Research Article published by International Journal of Advanced Technology and Engineering Explorati...
In this paper, we study the security of two recently proposed privacy-preserving biometric authentic...
Biometric authentication establishes the identity of an individual based on biometric templates (i.e...
Biometric authentication establishes the identity of an individual based on biometric templates (i.e...
Biometric authentication establishes the identity of an individual based on biometric templates (e.g...
Abstract. Biometric authentication establishes the identity of an individual based on biometric tem-...
Abstract. Biometric authentication establishes the identity of an indi-vidual based on biometric tem...
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols with re...
Systems employing biometric traits for people authentication and identification are witnessing growi...
Systems employing biometric traits for people authentication and identification are witnessing growi...
Systems employing biometric traits for people authentication and identification are witnessing growi...
Being unique and immutable for each person, biometric signals are widely used in access control syst...
Being unique and immutable for each person, biometric signals are widely used in access control syst...
© Springer International Publishing AG 2016. User authentication based on biometrics is getting an i...
Being unique and immutable for each person, biometric signals are widely used in access control syst...
Research Article published by International Journal of Advanced Technology and Engineering Explorati...
In this paper, we study the security of two recently proposed privacy-preserving biometric authentic...