Implementing passive authentication with enhanced risk-based security.
Yoshio KakizakiRenon DoineKenta KuwanaMikako YoshidaPublished in: SITIS (2022)
Keyphrases
- security requirements
- risk assessment
- identity authentication
- security mechanisms
- user authentication
- authentication mechanism
- security analysis
- data encryption
- fuzzy vault
- encryption decryption
- risk analysis
- security services
- integrity verification
- information security
- authentication protocol
- network security
- access control
- biometric data
- key agreement
- authentication systems
- factor authentication
- smart card
- key distribution
- public key cryptography
- virtual private network
- authentication scheme
- risk management
- security properties
- biometric systems
- security issues
- identity based cryptography
- private key
- risk factors
- identity management
- resource constrained
- statistical databases
- intrusion detection
- network access
- key management
- high security
- security protocols
- biometric authentication
- security systems
- key agreement protocol
- computer security
- multimodal biometrics
- public key
- elliptic curve cryptography
- biometric template
- security policies
- trusted platform module
- password authentication
- wireless local area network
- trust negotiation
- public key infrastructure
- trust relationships
- data security
- decision making