Abstract—Although use of fingerprint is highly effective in user authentication of networked services such as electronic payment, there are some problems in conventional systems, including high cost due to need for specialized fingerprint readers and limited usability. To resolve these problems, we propose a new system which incorporates a web-based fingerprint authentication using a smartphone as a fingerprint input device. Additionally, awatermark-based encryption solution is used to enhance system security. With this solution, the system can prevent informationinterception and replay attack. We demonstrate through proto-type implementation and experiments that our solution enhances security of web-based system, and the cost and usability pro...
The evolution of communication and information technology in today's time should not despise the var...
In our security-conscious society today, two factor authentication has been widely deployed for user...
the current practice of password based security for PLEs in general and the Internet in particular i...
Abstract—Although use of fingerprint is highly effective in user authentication of networked services...
Abstract— Fingerprint-based user authentication is highly effective in networked services such as el...
This thesis is a study of fingerprint based security system and a proposal of architecture to enhanc...
Automated fingerprint recognition is now widely used in many user authentication applications becaus...
The Internet makes it convenient for anyone to access publicly available information on the servers...
One of the major limitations with the authentication of users via the internet is the inherent lack ...
Mobile phones have become very complex devices through which we perform business functions and trans...
Due to the numerous data breaches, often resulting in the disclosure of a substantial amount of user...
Touch-based ngerprint sensor has been used in the mobile device, which can easily be hacked by an in...
For personal authentication of smartphone users, a convenient method, e.g., the use of a password th...
With fast evolution of mobile devices and mobile network, the need of protecting user sensitive info...
Abstract — We live in the era of information explosion and the smartphones are changing the way the ...
The evolution of communication and information technology in today's time should not despise the var...
In our security-conscious society today, two factor authentication has been widely deployed for user...
the current practice of password based security for PLEs in general and the Internet in particular i...
Abstract—Although use of fingerprint is highly effective in user authentication of networked services...
Abstract— Fingerprint-based user authentication is highly effective in networked services such as el...
This thesis is a study of fingerprint based security system and a proposal of architecture to enhanc...
Automated fingerprint recognition is now widely used in many user authentication applications becaus...
The Internet makes it convenient for anyone to access publicly available information on the servers...
One of the major limitations with the authentication of users via the internet is the inherent lack ...
Mobile phones have become very complex devices through which we perform business functions and trans...
Due to the numerous data breaches, often resulting in the disclosure of a substantial amount of user...
Touch-based ngerprint sensor has been used in the mobile device, which can easily be hacked by an in...
For personal authentication of smartphone users, a convenient method, e.g., the use of a password th...
With fast evolution of mobile devices and mobile network, the need of protecting user sensitive info...
Abstract — We live in the era of information explosion and the smartphones are changing the way the ...
The evolution of communication and information technology in today's time should not despise the var...
In our security-conscious society today, two factor authentication has been widely deployed for user...
the current practice of password based security for PLEs in general and the Internet in particular i...