A secure chaotic hash-based biometric remote user authentication scheme using mobile devices

12Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Traditional remote user authentication methods mainly employ the possession of a token (magnetic cards, cell phones, personal digital assistant (PDA), and notebook computers, etc.) and/or the knowledge of a secret (password, etc.) in order to establish the identity of an individual. In 2006, Khan et al. proposed an efficient and practical chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. The current paper, however, demonstrates that Khan et al.'s scheme is vulnerable to a privileged insider's attacks and impersonation attacks by using lost or stolen mobile devices. Also, we present an improvement to their scheme in order to isolate such problems. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Yoon, E. J., & Yoo, K. Y. (2007). A secure chaotic hash-based biometric remote user authentication scheme using mobile devices. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4537 LNCS, pp. 612–623). Springer Verlag. https://doi.org/10.1007/978-3-540-72909-9_68

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free