This thesis proposes a secure authentication protocol against physical session hijacking attacks. In client/server technology, users establish sessions to access the services offered by the servers. However, using physical session hijacking attacks, malicious users may physically take control of ongoing sessions. Malicious users also can establish sessions with servers using stolen passwords. In both cases, the server will be communicating with the wrong user who pretends to be the real user. The goal of this authentication protocol is to continuously and dynamically ensure that during an ongoing session the current session’s user is himself the real person that is known to the server. The proposed continuous and dynamic verification proc...
Abstract. Biometric authentication over public networks leads to a variety of privacy issues that ne...
New information technologies alongside their benefits also bring new dangers with themselves. It is ...
In this innovation time security of electronic applications is a genuine worry, because of the late ...
International audienceCrypto-biometric systems, which combine biometrics with cryptographic systems,...
A secure key agreement scheme plays a major role in protecting communications between the users usin...
Abstract. Biometric authentication establishes the identity of an individual based on biometric tem-...
Traditionally, a user requires substantial trust in a workstation for correctly handling her credent...
Biometric authentication establishes the identity of an individual based on biometric templates (i.e...
Biometric authentication establishes the identity of an individual based on biometric templates (e.g...
© Springer International Publishing AG 2016. User authentication based on biometrics is getting an i...
We propose a privacy preserving biometrics-based authentication protocol by which users can authenti...
International audienceSecure user authentication is a crucial service for many systems and applicati...
Nowadays bio-metric authentication systems are widely used in order to provide authentication withou...
Abstract: Biometrics and cryptography are two tools which have high potential for providing informat...
Identity manipulation is considered a serious security issue that has been enlarged with the spread ...
Abstract. Biometric authentication over public networks leads to a variety of privacy issues that ne...
New information technologies alongside their benefits also bring new dangers with themselves. It is ...
In this innovation time security of electronic applications is a genuine worry, because of the late ...
International audienceCrypto-biometric systems, which combine biometrics with cryptographic systems,...
A secure key agreement scheme plays a major role in protecting communications between the users usin...
Abstract. Biometric authentication establishes the identity of an individual based on biometric tem-...
Traditionally, a user requires substantial trust in a workstation for correctly handling her credent...
Biometric authentication establishes the identity of an individual based on biometric templates (i.e...
Biometric authentication establishes the identity of an individual based on biometric templates (e.g...
© Springer International Publishing AG 2016. User authentication based on biometrics is getting an i...
We propose a privacy preserving biometrics-based authentication protocol by which users can authenti...
International audienceSecure user authentication is a crucial service for many systems and applicati...
Nowadays bio-metric authentication systems are widely used in order to provide authentication withou...
Abstract: Biometrics and cryptography are two tools which have high potential for providing informat...
Identity manipulation is considered a serious security issue that has been enlarged with the spread ...
Abstract. Biometric authentication over public networks leads to a variety of privacy issues that ne...
New information technologies alongside their benefits also bring new dangers with themselves. It is ...
In this innovation time security of electronic applications is a genuine worry, because of the late ...