TY - GEN
T1 - Two-party and three-party remote user authentication schemes using biometric data only for emergency
AU - Lee, Chin Feng
AU - Huang, Shin Ruei
AU - Chien, Hung Yu
AU - Lee, Nam Yih
PY - 2010
Y1 - 2010
N2 - Passwords and smart cards have been widely utilized to remotely authenticate users for system security and users' convenience. However, it is not always safe or convenient for users to type in their passwords or carrying their personal cards. In such circumstances, pressing one's fingerprint instead of typing passwords and carrying personal smart cards is much more convenient, safer and more practical. In this paper, we show these circumstances, and then propose two fingerprint-based remote authentication schemes: one is for the 2-party case, and the other is for the 3-party case.
AB - Passwords and smart cards have been widely utilized to remotely authenticate users for system security and users' convenience. However, it is not always safe or convenient for users to type in their passwords or carrying their personal cards. In such circumstances, pressing one's fingerprint instead of typing passwords and carrying personal smart cards is much more convenient, safer and more practical. In this paper, we show these circumstances, and then propose two fingerprint-based remote authentication schemes: one is for the 2-party case, and the other is for the 3-party case.
UR - http://www.scopus.com/inward/record.url?scp=78651516262&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78651516262&partnerID=8YFLogxK
U2 - 10.1109/ISAC.2010.5670450
DO - 10.1109/ISAC.2010.5670450
M3 - Conference contribution
AN - SCOPUS:78651516262
SN - 9781424483143
T3 - 2010 2nd International Symposium on Aware Computing, ISAC 2010 - Symposium Guide
SP - 51
EP - 55
BT - 2010 2nd International Symposium on Aware Computing, ISAC 2010 - Symposium Guide
T2 - 2010 2nd International Symposium on Aware Computing, ISAC 2010
Y2 - 1 November 2010 through 4 November 2010
ER -