scholarly journals A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications

Author(s):  
Fengling Han ◽  
Jiankun Hu ◽  
Xinhuo Yu ◽  
Yong Feng ◽  
Jie Zhou
2016 ◽  
Vol 40 (11) ◽  
Author(s):  
Shehzad Ashraf Chaudhry ◽  
Muhammad Tawab Khan ◽  
Muhammad Khurram Khan ◽  
Taeshik Shon

2019 ◽  
Vol 10 (2) ◽  
pp. 61-74
Author(s):  
D S Bogdanov ◽  
Vladimir Olegovich Mironkin

Исследован проект стандарта защиты нейросетевых биометрических контейнеров, использующего криптографические алгоритмы. Показана несостоятельность рассмотренного совмещения парольной и нейросетевой биометрической систем защиты информации. Предложен алгоритм, позволяющий восстанавливать ключевую информацию, а также служебную информацию, определяющую процесс функционирования нейронной сети. Получен ряд численных характеристик алгоритма.


PLoS ONE ◽  
2017 ◽  
Vol 12 (5) ◽  
pp. e0176250 ◽  
Author(s):  
Younsung Choi ◽  
Youngsook Lee ◽  
Jongho Moon ◽  
Dongho Won

2017 ◽  
Vol 13 (8) ◽  
pp. 155014771772430 ◽  
Author(s):  
YoHan Park ◽  
KiSung Park ◽  
KyungKeun Lee ◽  
Hwangjun Song ◽  
YoungHo Park

Many remote user authentication schemes have been designed and developed to establish secure and authorized communication between a user and server over an insecure channel. By employing a secure remote user authentication scheme, a user and server can authenticate each other and utilize advanced services. In 2015, Cao and Ge demonstrated that An’s scheme is also vulnerable to several attacks and does not provide user anonymity. They also proposed an improved multi-factor biometric authentication scheme. However, we review and cryptanalyze Cao and Ge’s scheme and demonstrate that their scheme fails in correctness and providing user anonymity and is vulnerable to ID guessing attack and server masquerading attack. To overcome these drawbacks, we propose a security-improved authentication scheme that provides a dynamic ID mechanism and better security functionalities. Then, we show that our proposed scheme is secure against various attacks and prove the security of the proposed scheme using BAN Logic.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 109597-109611 ◽  
Author(s):  
Hailong Yao ◽  
Caifen Wang ◽  
Xingbing Fu ◽  
Chao Liu ◽  
Bin Wu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document