Cybercrimes against Consumers: Could Biometric Technology Be the Solution?
IEEE Internet Computing
An extended model of security policy for multi-applicative smart cards
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
An Agent Based Multifactor Biometric Security System
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part III
Analysis of a Biometric Authentication Protocol for Signature Creation Application
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
Journal of Theoretical and Applied Electronic Commerce Research
Improving the binding of electronic signatures to the signer by biometric authentication
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
A novel hybrid crypto-biometric authentication scheme for ATM based banking applications
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
MOC via TOC using a mobile agent framework
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Hi-index | 0.01 |
Since fingerprint data are no secrets but of public nature, the verification data transmitted to a smartcard for oncard-matching need protection by appropriate means in order to assure data origin in the biometric sensor and to prevent bypassing the sensor. For this purpose, the verification data to be transferred to the user smartcard is protected with a cryptographic checksum that is calculated within a separate security module controlled by a tamper resistant card terminal with integrated biometric sensor.