Handbook of Applied Cryptography
Handbook of Applied Cryptography
An improved BioHashing for human authentication
Pattern Recognition
Symmetric hash functions for secure fingerprint biometric systems
Pattern Recognition Letters
A Secure YS-Like User Authentication Scheme
Informatica
Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
An efficient biometrics-based remote user authentication scheme using smart cards
Journal of Network and Computer Applications
Robust iris verification for key management
Pattern Recognition Letters
Robust and simple authentication protocol for secure communication on the web
ICWE'05 Proceedings of the 5th international conference on Web Engineering
Hi-index | 0.00 |
This paper presents an entire chaos-based biometric remote user authentication scheme on tokens without using passwords. The proposed scheme is based on the chaotic hash function and chaotic pseudo-random number generator to provide secure mutual authentication over an insecure channel between the user and remote server. Compared with the related biometric authentication schemes, the proposed scheme does not require the user password to provide convenience to users. It also does not require time synchronization or delay-time limitations between the user and remote server to resolve time synchronization problems.