Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device.
Muhammad Khurram KhanSaru KumariMridul Kumar GuptaFahad Bin MuhayaPublished in: BICS (2013)
Keyphrases
- authentication scheme
- secret key
- smart card
- fuzzy vault
- user authentication
- mobile devices
- remote server
- biometric data
- biometric identification
- information security
- person authentication
- biometric systems
- fingerprint image quality
- security analysis
- authentication protocol
- biometric authentication
- security flaws
- public key
- fingerprint identification
- multimodal biometrics
- biometric template
- hash functions
- image authentication
- security mechanisms
- fingerprint images
- feature extraction
- personal identification
- real time
- signature scheme
- end to end
- face recognition