Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
A Real-Time Matching System for Large Fingerprint Databases
IEEE Transactions on Pattern Analysis and Machine Intelligence
Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints
ACM SIGOPS Operating Systems Review
A Secure YS-Like User Authentication Scheme
Informatica
DoS-resistant ID-based password authentication scheme using smart cards
Journal of Systems and Software
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
A novel user-participating authentication scheme
Journal of Systems and Software
Journal of Network and Computer Applications
An AAA scheme using ID-based ticket with anonymity in future mobile communication
Computer Communications
Mobile device integration of a fingerprint biometric remote authentication scheme
International Journal of Communication Systems
An enhanced biometrics-based remote user authentication scheme using mobile devices
International Journal of Computational Intelligence Studies
Portable tunnel establishment with a strong authentication design for secure private cloud
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Robust and flexible tunnel management for secure private cloud
ACM SIGAPP Applied Computing Review
The Journal of Supercomputing
International Journal of Information and Communication Technology
Hi-index | 0.00 |
This paper proposes two ID-based password authentication schemes, which does not require a dictionary of passwords or verification tables, with smart card and fingerprint. In these schemes, users can change their passwords freely. For a network without synchronization clocks, the proposed nonce-based authentication scheme can withstand message replay attacks. The proposed two schemes require a system to authenticate each user by each user's knowledge, possession, and biometrics, and this feature makes our schemes more reliable.