Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards

Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The author first reviews the recently proposed Li-Hwang's biometric-based remote user authentication scheme using smart cards; then shows that the Li-Hwang's scheme has some design flaws in their scheme. In order to withstand those flaws in their scheme, an improvement of their scheme is further proposed. The author also shows that the improved scheme provides strong authentication with the use of verifying biometric, password as well as random nonces generated by the user and the server as compared to that for the Li-Hwang's scheme and other related schemes.

References

    1. 1)
    2. 2)
    3. 3)
      • Linnartz, J.-P., Tuyls, P.: `New shielding functions to enhance privacy and prevent misuse of biometric templates', Proc. Audio and Video-Based Biometric Person Authentication, 2003, p. 393–402, (LNCS, 2688).
    4. 4)
    5. 5)
    6. 6)
      • M.S. Hwang , C.-Y. Liu . Authenticated encryption schemes: current status and key issues. Int. J. Netw. Secur. , 2 , 61 - 73
    7. 7)
    8. 8)
    9. 9)
    10. 10)
    11. 11)
      • Chang, Y.-F., Chang, C.-C., Su, Y.-W.: `A secure improvement on the user-friendly remote authentication with no time concurrency mechanism', Proc. 20th IEEE Int. Conf. on Advanced Information Networking and Applications, 2006, p. 197–213.
    12. 12)
      • D. Maltoni , D. Maio , A.K. Jain , S. Prabhakar . (2003) Handbook of fingerprint recognition.
    13. 13)
    14. 14)
    15. 15)
      • W. Stallings . (2004) Cryptography and network security: principles and practices.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2010.0125
Loading

Related content

content/journals/10.1049/iet-ifs.2010.0125
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address