A secured and efficient multi-factor biometric authentication scheme using plan recognition technique
One of the most important parts in security is an authentication. It has become an essential security features for network communication. Nowadays, there is a need for strong level of authentication to ensure high level of security is being delivered to the application. All of this being done while...
| Main Authors: | Mohd Ariffin, Noor Afiza, Mohd Sani, Nor Fazlida, Hanapi, Zurina, Mahmod, Ramlan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Asian Research Publication Network
2016
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/54933/ http://psasir.upm.edu.my/id/eprint/54933/1/A%20secured%20and%20efficient%20multi-factor%20biometric%20authentication%20scheme%20using%20plan%20.pdf |
Similar Items
Plan recognition scheme using multi-factors authentication for smart card online system
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2014)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2014)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
A novel authentication scheme to increase security for non-repudiation of users
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Design and implementation of multi factor mechanism for secure authentication system
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Modified shielding function for multi-biometric authentication and template protection
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
An accuracy of attack detection using attack recognition technique in multi-factor authentication scheme
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede ... [et al.]
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Efficient mutual authentication using kerberos for resource constraint smart meter in advanced metering infrastructure
by: Hasan, Md Mehedi, et al.
Published: (2023)
by: Hasan, Md Mehedi, et al.
Published: (2023)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
An improved secure authentication in lightweight IoT
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2023)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2023)
State of the art in biometric key binding and key generation schemes
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Advancing security measures: A brainwave-based biometric system for user identification and authentication
by: Muhammad Nur Arif, Mohd Farid, et al.
Published: (2024)
by: Muhammad Nur Arif, Mohd Farid, et al.
Published: (2024)
Password authentication using biometric function (voice/speaker recognition) / Mohd Shahman Samsul Ambia
by: Mohd Shahman , Samsul Ambia
Published: (2002)
by: Mohd Shahman , Samsul Ambia
Published: (2002)
Two-Factor Cancelable Biometrics Authenticator
by: Pang, Ying Han, et al.
Published: (2007)
by: Pang, Ying Han, et al.
Published: (2007)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Hybrid biometric authentication for automatic teller machine
by: Arokiasamy, Steven R., et al.
Published: (2024)
by: Arokiasamy, Steven R., et al.
Published: (2024)
Text and image: a new hybrid authentication scheme
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2021)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2021)
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
by: Roslan, Nuur Alifah, et al.
Published: (2020)
by: Roslan, Nuur Alifah, et al.
Published: (2020)
Moment Analysis In Biometric-Based Authentication Systems
by: Pang, Ying Han
Published: (2005)
by: Pang, Ying Han
Published: (2005)
Reliable template protection technique for biometric authentication
by: Ong, Teng Sian, et al.
Published: (2008)
by: Ong, Teng Sian, et al.
Published: (2008)
Secure scheme for user authentication and authorization in android environment
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
by: A. Rashid, Rozeha, et al.
Published: (2008)
by: A. Rashid, Rozeha, et al.
Published: (2008)
An application of biometric technology : Iris recognition
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Cellular automata based user authentication scheme using identity-bits commitment for wireless sensor network
by: Jamil, Norziana, et al.
Published: (2011)
by: Jamil, Norziana, et al.
Published: (2011)
Study On The Template Protection Technique In Biometric Authentication System
by: Ong, Thian Song
Published: (2008)
by: Ong, Thian Song
Published: (2008)
Typing Dynamics Biometric Authentication through Fuzzy Logic
by: Zhe, Jin, et al.
Published: (2008)
by: Zhe, Jin, et al.
Published: (2008)
A hybrid cryptosystem for biometric authentication and template protection
by: Jegede, Abayomi Joshua
Published: (2017)
by: Jegede, Abayomi Joshua
Published: (2017)
Fast and secure handover authentication scheme in Mobile WiMax
by: Zmezm, Hamzah F., et al.
Published: (2014)
by: Zmezm, Hamzah F., et al.
Published: (2014)
Photoplethysmogram based biometric recognition for twins
by: Mohammed Nadzr, Nur Izzati, et al.
Published: (2016)
by: Mohammed Nadzr, Nur Izzati, et al.
Published: (2016)
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
by: Khalid, Haqi, et al.
Published: (2021)
by: Khalid, Haqi, et al.
Published: (2021)
Behavioral Biometrics for User Authentication Using Self- Refreshing SOM
by: Teh, Chee Siong, et al.
Published: (2017)
by: Teh, Chee Siong, et al.
Published: (2017)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
An efficient bilateral remote user authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
The study of PPG and APG signals for biometric recognition
by: Sidek, Khairul Azami, et al.
Published: (2018)
by: Sidek, Khairul Azami, et al.
Published: (2018)
Biometric hash: high-confidence face recognition
by: Ngo, D.C.L., et al.
Published: (2006)
by: Ngo, D.C.L., et al.
Published: (2006)
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by: Olalere, Morufu, et al.
Published: (2016)
by: Olalere, Morufu, et al.
Published: (2016)
Similar Items
-
Plan recognition scheme using multi-factors authentication for smart card online system
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2014) -
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017) -
A novel authentication scheme to increase security for non-repudiation of users
by: Hussein, Khalid Waleed, et al.
Published: (2013) -
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017) -
Design and implementation of multi factor mechanism for secure authentication system
by: Hussein, Khalid Waleed, et al.
Published: (2013)