Smart card security and applications
Smart card security and applications
Biometrics, access control, smart cards: a not so simple combination
Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications
Biometrical fingerprint recognition: don't get your fingers burned
Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Smart Card Handbook
A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication
Computational Intelligence and Security
Integrating fingerprint verification into the smart card-based healthcare information system
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Impact of embedding scenarios on the smart card-based fingerprint verification
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Secure and efficient transmissions of fingerprint images for embedded processors
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
From features extraction to strong security in mobile environment: a new hybrid system
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
Hi-index | 0.00 |
The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smart-card systems is growing in popularity. In such a biometrics-based cardholder authentication system, sensitive data may be transferred between the smartcard and the card reader. In this paper we identify and classify possible threats to the communications link between card and card reader during cardholder authentication. We also analyse the impact of these threats. We consider five different architectures and use the threat analysis to indicate the relative security of the various possible architectures.