Cryptographic Authentication from the Iris.
Sailesh SimhadriJames SteelBenjamin FullerPublished in: ISC (2019)
Keyphrases
- personal authentication
- encryption decryption
- public key cryptography
- smart card
- iris recognition
- fuzzy vault
- secure communication
- multimodal biometrics
- elliptic curve cryptography
- factor authentication
- security protocols
- authentication scheme
- authentication protocol
- pseudo random number
- security mechanisms
- key management
- iris images
- public key
- biometric authentication
- digital signature
- public key encryption
- key distribution
- elliptic curve
- secret key
- palmprint
- hash functions
- iris segmentation
- digital watermarking
- fragile watermarking
- security services
- biometric identification
- security analysis
- identity authentication
- security requirements
- circular hough transform
- public key infrastructure
- integrity verification
- ad hoc networks
- encryption key
- biometric template
- security properties
- security systems
- biometric recognition
- biometric data
- user authentication
- cryptographic protocols