A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol
S. Usha,S. Kuppuswami,M. Karthik +2 more
TLDR
An enhanced session key agreement protocol which uses the data derived from iris signature is suggested to improve the security of biometric based applications like e-Passport, e-Driving license, etc.Abstract:
Cryptographic protocols are the backbone of information security. Unfortunately the security of several important components of these protocols can be neglected. This causes violation of p...read more
Citations
More filters
Journal ArticleDOI
A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function
Arpita Sarkar,Binod Kumar Singh +1 more
TL;DR: Based on the experimental evaluation across four datasets of FVC2002, the proposed structure is privacy-preserving and is excellently fitting for various real-time biometric-based applicability.
Journal ArticleDOI
A cancelable biometric based secure session key agreement protocol employing elliptic curve cryptography
Arpita Sarkar,Binod Kumar Singh +1 more
TL;DR: A structure for reliable communication among two users using cancelable fingerprint based session key agreement protocol has been suggested, which is privacy-preserving and is excellently fitting for various real-time biometric-based applicability.
Journal ArticleDOI
Formal verification for a PMQTT protocol
TL;DR: The Protected Message Queue Telemetry Transport (PMQTT) protocol is proposed which is based on MQTT with added cryptographic primitives to offer security services for IoT systems.
Journal ArticleDOI
A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT)
K. Swapna Sudha,N. Jeyanthi +1 more
Journal ArticleDOI
Automatic Turning ON/OFF Bike Indicator Using Offline GPS Navigation System
TL;DR: An automatic turning on/off bike indicators using offline GPS navigation system is proposed that would help the people during the rush hours and also during the emergency situations to avoid accidents.
References
More filters
Patent
Biometric personal identification system based on iris analysis.
TL;DR: In this article, the sign of the projection of many different parts of the iris onto these filters determines each bit in an iris code, and the similarity metric (Hamming distance) is computed from the XOR of any two iris codes.
Proceedings ArticleDOI
Security and Privacy Issues in E-passports
TL;DR: In this paper, the privacy and security issues of the International Civil Aviation Organization (ICAO) standard for e-passports have been analyzed in the context of next-generation ID cards.
Journal ArticleDOI
A More Secure Authentication Scheme for Telecare Medicine Information Systems
He Debiao,Chen Jianhua,Zhang Rui +2 more
TL;DR: This work proposes an improved scheme for authentication scheme for mobile devices in telecare medicine information system that is not only more secure than Wu et al.
Journal ArticleDOI
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
Jen-Ho Yang,Chin-Chen Chang +1 more
TL;DR: The proposed ID-based remote mutual authentication with key agreement scheme on ECC does not require public keys for users such that the additional computations for certificates can be reduced and not only provides mutual authentication but also supports a session key agreement between the user and the server.
Proceedings ArticleDOI
Automatic proof of strong secrecy for security protocols
TL;DR: A new automatic technique for proving strong secrecy for security protocols that relies on an automatic translation of the protocol into Horn clauses, and a resolution algorithm on the clauses.
Related Papers (5)
Security verification for authentication and key exchange protocols
H. Ota,S. Kiyomoto,T. Tanaka +2 more