Results 1 to 10 of about 35,630 (203)
A novel privacy-preserving biometric authentication scheme [PDF]
Most existing secure biometric authentication schemes are server-centric, and users must fully trust the server to store, process, and manage their biometric data.
Xuechun Mao +3 more
doaj +3 more sources
Securing biometric authentication system using blockchain
Biometric authentication systems have major security weaknesses: risk of biometric information leakage, unreliability of authentication modules, and non-transparency of biometric information management.
Youn Kyu Lee, Jongwook Jeong
doaj +3 more sources
ToMAS: Torus-based secure multi-factor biometric authentication system [PDF]
Biometric authentication has emerged as a convenient method for identity verification, but its widespread adoption raises serious privacy concerns. In this paper, we propose a Torus-based secure Multi-factor biometric Authentication System (ToMAS) that ...
Mi Yeon Hong +3 more
doaj +2 more sources
Using biometric data to protect information
Objective. An urgent task is to evaluate the system for protecting access to information while minimizing errors, based on the use of human biometric data. It is necessary to evaluate and compare methods and solutions of biometric authentication, and the
K. N. Vlasov +2 more
doaj +1 more source
BioShare: An Open Framework for Trusted Biometric Authentication under User Control
Generally, biometric authentication is conducted either by mobile terminals in local-processing mode or by public servers in centralized-processing mode.
Quan Sun, Jie Wu, Wenhai Yu
doaj +1 more source
Method of Two-Factor Authentication of Electronic Documents Using Enhanced Encrypted Non-Certified Digital Signature with the Use of Security Token with Biometric Data [PDF]
The purpose of this study is to develop a method for two-factor authentication of electronic documents using an enhanced encrypted non-certified digital signature with the use of a security token with biometric data (fingerprint image).
T. A. Burganova +2 more
doaj +1 more source
Biometric Authentication [PDF]
User authentication is the keystone of information security. Even the most craftily built and diligently monitored computer system will crumble if there is a flaw in its user authentication system(Minaev, 2010). A hacker able to exploit such a flaw will be able to convince the computer system that he is a legitimate user – possibly even a specific ...
+4 more sources
Factors influencing smartphone owners' acceptance of Biometric Authentication methods
Smartphones are the world's most widely used personal computing devices. PINs and passcodes have long been the most popular authentication methods in smartphones and even in the pre-smartphone era.
La Ode Abdul Wahid, Ahmad R Pratama
doaj +1 more source
In existing biometric authentication methods, the user must perform an authentication operation such as placing a finger in a scanner or facing a camera.
Masaki Yasuhara, Isao Nambu, Shohei Yano
doaj +1 more source
Privacy-Preserving Cancelable Biometric Authentication Based on RDM and ECC
Biometric authentication is getting increasingly popular and demands a wide range of solutions to against increasing cybercrimes and digital identity thefts.
Lei Wu +4 more
doaj +1 more source

