搜索结果: 1-10 共查到“军队指挥学 Biometrics”相关记录10条 . 查询时间(0.046 秒)
Enhancing Security by Combining Biometrics and Cryptography
information systems current performance results
font style='font-size:12px;'>
2017/4/24
The impressive amount of recent technological advancements in the area of information systems have brought along, besides the multitude of positive aspects, some negative aspects too. The most obvious...
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics
Key agreement scheme Anonymous multi-server Securty
font style='font-size:12px;'>
2016/1/26
Chuang and Chen propose an anonymous multi server authenticated
key agreement scheme based on trust computing using smart
card, password, and biometrics. Chuang and Chen say that this scheme
not on...
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
Biometrics user authentication smart cards security
font style='font-size:12px;'>
2012/6/14
Authentication and key exchange are fundamental techniques for enabling secure communication over mobile networks. In order to reduce implementation complexity and achieve computation efficiency, desi...
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
Biometrics user authentication smart cards security
font style='font-size:12px;'>
2012/3/20
Authentication and key exchange are fundamental techniques for enabling secure communication over mobile networks. In order to reduce implementation complexity and achieve computation efficiency, desi...
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
Biometrics user authentication smart cards security
font style='font-size:12px;'>
2012/8/28
Authentication and key exchange are fundamental techniques for enabling secure communication over mobile networks. In order to reduce implementation complexity and achieve computation efficiency, desi...
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme
cryptographic protocols
font style='font-size:12px;'>
2012/3/26
In 2010, Yoon et al. proposed a robust biometrics- based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. In this letter, however, we show that Yoo...
Security flaws in a biometrics-based multi-server authentication with key agreement scheme
Authentication Key agreement Masquerade attack Privileged insider attack
font style='font-size:12px;'>
2011/7/25
Recently, Yoon et al. proposed an efficient biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem (ECC) for multi-server communication e...
Security flaws in a biometrics-based multi-server authentication with key agreement scheme
Authentication Key agreement Masquerade attack Privileged insider attack Elliptic curve cryptosystem Smart card
font style='font-size:12px;'>
2012/3/27
Recently, Yoon et al. proposed an efficient biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem (ECC) for multi-server communication e...
A New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, KSS(I)
public-key cryptography / Secret Sharing Scheme Biometrics Reed Solomon code
font style='font-size:12px;'>
2012/3/29
In this paper, we present a new secret sharing scheme, referred to as KSS(I) on the basis of systematic Reed-Solomon code[2]. We show that KSS(I) can be successfully applied to biometrics.
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Strong Keys Biometrics Noisy Data
font style='font-size:12px;'>
2009/4/10
We provide formal definitions and efficient secure techniques for
• turning noisy information into keys usable for any cryptographic application, and, in particular,
• reliably and secur...