Security on the move: indirect authentication using Kerberos
MobiCom '96 Proceedings of the 2nd annual international conference on Mobile computing and networking
The performance of public key-enabled kerberos authentication in mobile computing applications
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
The Challenges of Mobile Computing
Computer
Reusable cryptographic fuzzy extractors
Proceedings of the 11th ACM conference on Computer and communications security
Secure Web Services for Low-Cost Devices
ISORC '05 Proceedings of the Eighth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing
Efficient fingerprint-based user authentication for embedded systems
Proceedings of the 42nd annual Design Automation Conference
Pupil and Iris Localization for Iris Recognition in Mobile Phones
SNPD-SAWN '06 Proceedings of the Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
M-Commerce Secured Using Web-Enabled Mobile Biometric Agents
WI-IATW '07 Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
Web Services are improving rapidly and intended to provide exchanging of information between systems over the network. Many services are introduced to users as web services; therefore, high security solution is needed to protect users' privacy and confidentiality. The need for strong security systems increases in case of mobile web services, since mobile users are more exposed to security threats. In this paper, we introduce and propose a biometric encryption to mobile web services authentication based on iris. The user iris will be used to regenerate the user's encryption key on-the-fly on each time the user needs to be authenticated. This key is stronger than passwords and shorter than biometric data, which balances between security and performance.