Enhancing security

  • Boys J
N/ACitations
Citations of this article
31Readers
Mendeley users who have this article in their library.

Abstract

Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications such as e- commerce. In this paper we outline the inherent strengths of biometrics-based authentication, identify the weak links in systems employing biometrics-based authentication, and present new solutions for eliminating some of these weak links. Although, for illustration purposes, fingerprint authentication is used throughout, our analysis extends to other biometrics-based methods.

Cite

CITATION STYLE

APA

Boys, J. D. (2015). Enhancing security. In Clinton’s Grand Strategy (pp. 115–160). Bloomsbury Publishing Plc. https://doi.org/10.5040/9781472528780.ch-004

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free