User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Most of existing user authentication schemes require high computation cost of exponentiation operations for the purpose of security. However, it is not suitable for mobile devices...
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...
: The increasing pressure for network accessible information and business applications demands secure, interoperable, cost efficient and user self-service authentication procedures...
—Over the last few years, many researchers have paid a lot of attention to the user authentication problem. However, to date, there has been relatively little research suited for...