Two-party and three-party remote user authentication schemes using biometric data only for emergency

Chin Feng Lee, Shin Ruei Huang, Hung Yu Chien, Nam Yih Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Passwords and smart cards have been widely utilized to remotely authenticate users for system security and users' convenience. However, it is not always safe or convenient for users to type in their passwords or carrying their personal cards. In such circumstances, pressing one's fingerprint instead of typing passwords and carrying personal smart cards is much more convenient, safer and more practical. In this paper, we show these circumstances, and then propose two fingerprint-based remote authentication schemes: one is for the 2-party case, and the other is for the 3-party case.

Original languageEnglish
Title of host publication2010 2nd International Symposium on Aware Computing, ISAC 2010 - Symposium Guide
Pages51-55
Number of pages5
DOIs
Publication statusPublished - 2010
Event2010 2nd International Symposium on Aware Computing, ISAC 2010 - Sapporo, Japan
Duration: 2010 Nov 12010 Nov 4

Publication series

Name2010 2nd International Symposium on Aware Computing, ISAC 2010 - Symposium Guide

Other

Other2010 2nd International Symposium on Aware Computing, ISAC 2010
Country/TerritoryJapan
CitySapporo
Period10-11-0110-11-04

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Two-party and three-party remote user authentication schemes using biometric data only for emergency'. Together they form a unique fingerprint.

Cite this