Related references
Note: Only part of the references are listed.Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System
Zeeshan Siddiqui et al.
JOURNAL OF MEDICAL SYSTEMS (2014)
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
Guilin Wang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2013)
Privacy Preserving Data Sharing With Anonymous ID Assignment
Larry A. Dunning et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)
Satisfying Privacy Requirements Before Data Anonymization
Xiaoxun Sun et al.
COMPUTER JOURNAL (2012)
A strong user authentication scheme with smart cards for wireless communications
Daojing He et al.
COMPUTER COMMUNICATIONS (2011)
A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card
Jing Xu et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2011)
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems
Xinyi Huang et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
Xiong Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)
An efficient biometrics-based remote user authentication scheme using smart cards
Chun-Ta Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2010)
An improved smart card based password authentication scheme with provable security
Jing Xu et al.
COMPUTER STANDARDS & INTERFACES (2009)
Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics
Chun-I Fan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2009)
Template-free biometric-key generation by means of fuzzy genetic clustering
Weiguo Sheng et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2008)
Two-factor mutual authentication based on smart cards and passwords
Guomin Yang et al.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2008)
Combining minutiae descriptors for fingerprint matching
Jianjiang Feng
PATTERN RECOGNITION (2008)
Fingerprint-based fuzzy vault: Implementation and performance
Karthik Nandakumar et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2007)
Biometrics: A tool for information security
Anil K. Jain et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2006)
An improvement of the Yang-Shieh password authentication schemes
CC Yang et al.
APPLIED MATHEMATICS AND COMPUTATION (2005)
Biometric cryptosystems: Issues and challenges
U Uludag et al.
PROCEEDINGS OF THE IEEE (2004)
Security enhancement for the timestamp-based password authentication scheme using smart cards
JJ Shen et al.
COMPUTERS & SECURITY (2003)
An enhancement of timestamp-based password authentication scheme
L Fan et al.
COMPUTERS & SECURITY (2002)