Sign Up to like & get
recommendations!
0
Published in 2021 at "Measurement"
DOI: 10.1016/j.measurement.2021.109257
Abstract: Abstract Biometric-based authentication systems are promising because of unique biometric features for each person. Generally, biometric features are generated , and biometric templates or bio-hash codes are calculated and stored in Authentication Data Table (ADT)…
read more here.
Keywords:
authentication;
privacy preserving;
untrusted server;
based authentication ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2022.3162623
Abstract: Based on the Threshold Predicate Encryption (TPE), the biometric authentication scheme PassBio aims to correctly authenticate genuine end-users without leaking their biometric privacy information. However, this article proposes two impersonation attacks to PassBio by merely…
read more here.
Keywords:
authentication;
biometric authentication;
countermeasures privacy;
privacy preserving ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "PLOS ONE"
DOI: 10.1371/journal.pone.0286215
Abstract: Most existing secure biometric authentication schemes are server-centric, and users must fully trust the server to store, process, and manage their biometric data. As a result, users’ biometric data could be leaked by outside attackers…
read more here.
Keywords:
authentication;
authentication scheme;
biometric authentication;
privacy preserving ... See more keywords