Traditional remote user authentication methods mainly employ the possession of a token (magnetic cards, cell phones, personal digital assistant (PDA), and notebook computers, etc.) and/or the knowledge of a secret (password, etc.) in order to establish the identity of an individual. In 2006, Khan et al. proposed an efficient and practical chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. The current paper, however, demonstrates that Khan et al.'s scheme is vulnerable to a privileged insider's attacks and impersonation attacks by using lost or stolen mobile devices. Also, we present an improvement to their scheme in order to isolate such problems. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Yoon, E. J., & Yoo, K. Y. (2007). A secure chaotic hash-based biometric remote user authentication scheme using mobile devices. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4537 LNCS, pp. 612–623). Springer Verlag. https://doi.org/10.1007/978-3-540-72909-9_68
Mendeley helps you to discover research relevant for your work.