Secure fingerprint-based authentication for Lotus Notes®.
Nalini K. RathaJonathan H. ConnellRuud M. BollePublished in: MM&Sec (2001)
Keyphrases
- lotus notes
- user authentication
- authentication systems
- authentication mechanism
- authentication scheme
- password authentication
- authentication protocol
- factor authentication
- security mechanisms
- data encryption
- fuzzy vault
- biometric data
- identity management
- key distribution
- multimodal biometrics
- security analysis
- integrity verification
- security level
- secure manner
- security requirements
- smart card
- security services
- public key cryptography
- rights management
- client server
- key exchange protocol
- biometric systems
- key agreement
- electronic payment
- mutual authentication
- biometric recognition
- biometric authentication
- encryption decryption
- security issues
- key management
- biometric identification
- cryptographic protocols
- fingerprint identification
- access control
- data management
- biometric template
- public key
- private key
- key agreement protocol
- resource constrained
- diffie hellman
- public key infrastructure
- trusted third party
- secret key
- information security
- cloud computing
- digital signature
- digital libraries
- metadata