Security Enhancement of Biometric-Based Authentication Systems Using Smart Card
Remote authentication has been extensively studied over the past few decades, with password-based authentication being a common approach since Lamport’s 1981 proposal of a password-based remote authentication scheme. Despite numerous advancements, including the introduction of biometric a...
| Published in: | IEEE Access |
|---|---|
| Main Author: | Hyunseok Kim |
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2024-01-01
|
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10758635/ |
Similar Items
The Concept of “Biometrics”. Biometric authentication protocols
by: D. V. Sokolov
Published: (2012-12-01)
by: D. V. Sokolov
Published: (2012-12-01)
Secure password-based authentication scheme with anonymous identity without smart cards
by: WANG Bang-ju1, et al.
Published: (2008-01-01)
by: WANG Bang-ju1, et al.
Published: (2008-01-01)
Secure password-based authentication scheme with anonymous identity without smart cards
by: WANG Bang-ju1, et al.
Published: (2008-01-01)
by: WANG Bang-ju1, et al.
Published: (2008-01-01)
Two-factor authenticated key agreement protocol based on biometric feature and password
by: Xiao-wei LI, et al.
Published: (2017-07-01)
by: Xiao-wei LI, et al.
Published: (2017-07-01)
Two-factor authenticated key agreement protocol based on biometric feature and password
by: Xiao-wei LI, et al.
Published: (2017-07-01)
by: Xiao-wei LI, et al.
Published: (2017-07-01)
User Authentication based on Continuous Touch Biometrics
by: Christina J Kroeze, et al.
Published: (2016-12-01)
by: Christina J Kroeze, et al.
Published: (2016-12-01)
Authentication Methods and Techniques for Information Security Purposes in Corporate Information Systems
by: O. V. Kulikova
Published: (2010-09-01)
by: O. V. Kulikova
Published: (2010-09-01)
A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User Profiling
by: S. Ayeswarya, et al.
Published: (2024-01-01)
by: S. Ayeswarya, et al.
Published: (2024-01-01)
Iris based cancelable biometric cryptosystem for secure healthcare smart card
by: Firdous Kausar
Published: (2021-12-01)
by: Firdous Kausar
Published: (2021-12-01)
Strengthening Cybersecurity Resilience: An Investigation of Customers’ Adoption of Emerging Security Tools in Mobile Banking Apps
by: Irfan Riasat, et al.
Published: (2025-04-01)
by: Irfan Riasat, et al.
Published: (2025-04-01)
A Remote User Security Authentication Scheme Using Smart Card and Password Protection for WSN
by: Liping Liu
Published: (2015-12-01)
by: Liping Liu
Published: (2015-12-01)
A Remote User Security Authentication Scheme Using Smart Card and Password Protection for WSN
by: Liping Liu
Published: (2015-12-01)
by: Liping Liu
Published: (2015-12-01)
Biometric Technologies in Recognition Systems: A Survey
by: Shihab A. Shawkat, et al.
Published: (2019-11-01)
by: Shihab A. Shawkat, et al.
Published: (2019-11-01)
Secure and Efficient WBAN Authentication Protocols for Intra-BAN Tier
by: Abdullah M. Almuhaideb, et al.
Published: (2022-08-01)
by: Abdullah M. Almuhaideb, et al.
Published: (2022-08-01)
Fingerprint Password Method Provides Improved Accuracy over Token-based Authentication for Efficient and Secure File Transfers
by: Rithvik R.K., et al.
Published: (2024-01-01)
by: Rithvik R.K., et al.
Published: (2024-01-01)
A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes
by: JiHyeon Oh, et al.
Published: (2021-02-01)
by: JiHyeon Oh, et al.
Published: (2021-02-01)
A Review on Secure Authentication Mechanisms for Mobile Security
by: Syed Shabih Ul Hasan, et al.
Published: (2025-01-01)
by: Syed Shabih Ul Hasan, et al.
Published: (2025-01-01)
Design of Inter-BAN Authentication Protocols for WBAN in a Cloud-Assisted Environment
by: Abdullah M. Almuhaideb, et al.
Published: (2022-10-01)
by: Abdullah M. Almuhaideb, et al.
Published: (2022-10-01)
PALM VEIN PATTERN BIOMETRIC AUTHENTICATION TECHNOLOGY
by: S. O. Baranov, et al.
Published: (2017-08-01)
by: S. O. Baranov, et al.
Published: (2017-08-01)
Two-factor authentication based on keyword spotting and speaker verification
by: Olesia Barkovska
Published: (2025-09-01)
by: Olesia Barkovska
Published: (2025-09-01)
Two-factor authentication based on keyword spotting and speaker verification
by: Олеся Барковська
Published: (2025-09-01)
by: Олеся Барковська
Published: (2025-09-01)
An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture
by: Huihui Huang, et al.
Published: (2021-07-01)
by: Huihui Huang, et al.
Published: (2021-07-01)
An Investigation of Biometric Authentication in the Healthcare Environment
by: Janelle Mason, et al.
Published: (2020-12-01)
by: Janelle Mason, et al.
Published: (2020-12-01)
FINGERPRINTS TO AUTHENTICATE TRANSACTIONS IN CONTACTLESS CARDS
by: soleen J. Ibrahim, et al.
Published: (2023-10-01)
by: soleen J. Ibrahim, et al.
Published: (2023-10-01)
A robust anonymous biometric-based remote user authentication scheme using smart cards
by: Ashok Kumar Das, et al.
Published: (2015-04-01)
by: Ashok Kumar Das, et al.
Published: (2015-04-01)
The design and evaluation of adaptive biometric authentication systems: Current status, challenges and future direction
by: Riseul Ryu, et al.
Published: (2023-12-01)
by: Riseul Ryu, et al.
Published: (2023-12-01)
RFID Authentication System Based on User Biometric Information
by: Yuanmu Huang, et al.
Published: (2022-12-01)
by: Yuanmu Huang, et al.
Published: (2022-12-01)
Secure Biometric Verification in the Presence of Malicious Adversaries
by: Kamela Al-Mannai, et al.
Published: (2025-01-01)
by: Kamela Al-Mannai, et al.
Published: (2025-01-01)
iSignDB: A database for smartphone signature biometrics
by: Suraiya Jabin, et al.
Published: (2020-12-01)
by: Suraiya Jabin, et al.
Published: (2020-12-01)
Bio-2FA-IoD: A Biometric-Enhanced Two-Factor Authentication Protocol for Secure Internet of Drones Operations
by: Hyunseok Kim, et al.
Published: (2025-07-01)
by: Hyunseok Kim, et al.
Published: (2025-07-01)
Biometric Fusion for Enhanced Authentication in Cloud Computing Environments
by: Chiyo Miyazawa, et al.
Published: (2024-03-01)
by: Chiyo Miyazawa, et al.
Published: (2024-03-01)
Privacy Preserving and Secure Iris-Based Biometric Authentication for Computer Networks
by: Przemysław Strzelczyk
Published: (2023-06-01)
by: Przemysław Strzelczyk
Published: (2023-06-01)
Stability of password authentication in infocommunication networks
by: M. N. Bobov, et al.
Published: (2020-09-01)
by: M. N. Bobov, et al.
Published: (2020-09-01)
Continuous Behavioral Biometric Authentication for Secure Metaverse Workspaces in Digital Environments
by: Giluk Kang, et al.
Published: (2025-07-01)
by: Giluk Kang, et al.
Published: (2025-07-01)
Token-based authentication for Hadoop platform
by: Mohamed Haggag, et al.
Published: (2023-04-01)
by: Mohamed Haggag, et al.
Published: (2023-04-01)
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
by: Vincent Omollo Nyangaresi, et al.
Published: (2025-01-01)
by: Vincent Omollo Nyangaresi, et al.
Published: (2025-01-01)
Cancelable templates for secure face verification based on deep learning and random projections
by: Arslan Ali, et al.
Published: (2024-03-01)
by: Arslan Ali, et al.
Published: (2024-03-01)
A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge
by: Yeni Farida, et al.
Published: (2025-03-01)
by: Yeni Farida, et al.
Published: (2025-03-01)
An enhanced dynamic ID-based authentication scheme for telecare medical information systems
by: Ankita Chaturvedi, et al.
Published: (2017-01-01)
by: Ankita Chaturvedi, et al.
Published: (2017-01-01)
From Fusion to Adaptation: Investigation on Enhancing Multimodal Biometric Authentication Systems
by: Riseul Ryu, et al.
Published: (2025-01-01)
by: Riseul Ryu, et al.
Published: (2025-01-01)
Similar Items
-
The Concept of “Biometrics”. Biometric authentication protocols
by: D. V. Sokolov
Published: (2012-12-01) -
Secure password-based authentication scheme with anonymous identity without smart cards
by: WANG Bang-ju1, et al.
Published: (2008-01-01) -
Secure password-based authentication scheme with anonymous identity without smart cards
by: WANG Bang-ju1, et al.
Published: (2008-01-01) -
Two-factor authenticated key agreement protocol based on biometric feature and password
by: Xiao-wei LI, et al.
Published: (2017-07-01) -
Two-factor authenticated key agreement protocol based on biometric feature and password
by: Xiao-wei LI, et al.
Published: (2017-07-01)
