Affiliation:
1. Kyungil University, Kyungsansi, Kyungpuk, Korea
2. Kyungpook Nat'l University, Daegu, Korea
Abstract
This paper proposes two ID-based password authentication schemes, which does not require a dictionary of passwords or verification tables, with smart card and fingerprint. In these schemes, users can change their passwords freely. For a network without synchronization clocks, the proposed nonce-based authentication scheme can withstand message replay attacks. The proposed two schemes require a system to authenticate each user by each user's knowledge, possession, and biometrics, and this feature makes our schemes more reliable.
Publisher
Association for Computing Machinery (ACM)
Reference8 articles.
1. B. Schneier Applied cryptography John Wiley & Sons Inc. 1996. B. Schneier Applied cryptography John Wiley & Sons Inc. 1996.
2. A public key cryptosystem and a signature scheme based on discrete logarithms;T.;IEEE Transactions on Information Theory,1985
3. Smart card based secure password authentication scheme
4. Fingerprint-based remote user authentication scheme using smart cards;Lee J. K.;IEE Electronics Letters,2002
Cited by
54 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献