A new fingerprint-based remote user authentication scheme using mobile devices

Abstract

Recently, Khan et al. proposed an efficient and practical chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Unfortunately, Yoon-Yoo demonstrated that Khan et al.'s scheme was vulnerable to a privileged insider attack and an impersonation attack by using lost or stolen mobile devices. To isolate such problems, Yoon… (More)

1 Figure or Table

Topics

  • Presentations referencing similar topics