scispace - formally typeset
Open AccessJournal ArticleDOI

A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol

TLDR
An enhanced session key agreement protocol which uses the data derived from iris signature is suggested to improve the security of biometric based applications like e-Passport, e-Driving license, etc.
Abstract
Cryptographic protocols are the backbone of information security. Unfortunately the security of several important components of these protocols can be neglected. This causes violation of p...

read more

Citations
More filters
Journal ArticleDOI

A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function

TL;DR: Based on the experimental evaluation across four datasets of FVC2002, the proposed structure is privacy-preserving and is excellently fitting for various real-time biometric-based applicability.
Journal ArticleDOI

A cancelable biometric based secure session key agreement protocol employing elliptic curve cryptography

TL;DR: A structure for reliable communication among two users using cancelable fingerprint based session key agreement protocol has been suggested, which is privacy-preserving and is excellently fitting for various real-time biometric-based applicability.
Journal ArticleDOI

Formal verification for a PMQTT protocol

TL;DR: The Protected Message Queue Telemetry Transport (PMQTT) protocol is proposed which is based on MQTT with added cryptographic primitives to offer security services for IoT systems.
Journal ArticleDOI

Automatic Turning ON/OFF Bike Indicator Using Offline GPS Navigation System

TL;DR: An automatic turning on/off bike indicators using offline GPS navigation system is proposed that would help the people during the rush hours and also during the emergency situations to avoid accidents.
References
More filters
Patent

Biometric personal identification system based on iris analysis.

John Daugman
TL;DR: In this article, the sign of the projection of many different parts of the iris onto these filters determines each bit in an iris code, and the similarity metric (Hamming distance) is computed from the XOR of any two iris codes.
Proceedings ArticleDOI

Security and Privacy Issues in E-passports

TL;DR: In this paper, the privacy and security issues of the International Civil Aviation Organization (ICAO) standard for e-passports have been analyzed in the context of next-generation ID cards.
Journal ArticleDOI

A More Secure Authentication Scheme for Telecare Medicine Information Systems

TL;DR: This work proposes an improved scheme for authentication scheme for mobile devices in telecare medicine information system that is not only more secure than Wu et al.
Journal ArticleDOI

An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem

TL;DR: The proposed ID-based remote mutual authentication with key agreement scheme on ECC does not require public keys for users such that the additional computations for certificates can be reduced and not only provides mutual authentication but also supports a session key agreement between the user and the server.
Proceedings ArticleDOI

Automatic proof of strong secrecy for security protocols

TL;DR: A new automatic technique for proving strong secrecy for security protocols that relies on an automatic translation of the protocol into Horn clauses, and a resolution algorithm on the clauses.