A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
On-Line Fingerprint Verification
IEEE Transactions on Pattern Analysis and Machine Intelligence
Password authentication with insecure communication
Communications of the ACM
IEEE Transactions on Pattern Analysis and Machine Intelligence
ID-based password authentication scheme using smart cards and fingerprints
ACM SIGOPS Operating Systems Review
Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints
ACM SIGOPS Operating Systems Review
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Improving the security of 'a flexible biometrics remote user authentication scheme'
Computer Standards & Interfaces
An efficient biometrics-based remote user authentication scheme using smart cards
Journal of Network and Computer Applications
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Journal of Network and Computer Applications
An efficient and practical fingerprint-based remote user authentication scheme with smart cards
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Review: Dynamic ID-based remote user password authentication schemes using smart cards: A review
Journal of Network and Computer Applications
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
An efficient remote use authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
A modified remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Hi-index | 0.00 |
Remote user authentication is a mechanism, in which the remote server verifies the legitimacy of a user over an insecure communication channel. Recently, Wang and Li proposed a fingerprint-based remote user authentication scheme using mobile devices. We demonstrate that their scheme is vulnerable and susceptible to many attacks and has some practical pitfalls. To solve these problems, we propose an efficient fingerprint-based remote user authentication scheme using mobile devices. Proposed scheme not only overcomes all the drawbacks and problems of Wang and Li's scheme, but also provides secure and user-friendly fingerprint-based remote user authentication over insecure networks.