Filters








3,268 Hits in 3.8 sec

MOC via TOC Using a Mobile Agent Framework [chapter]

Stefano Bistarelli, Stefano Frassi, Anna Vaccarelli
2005 Lecture Notes in Computer Science  
The biometric match is performed by a module running on the user's workstation, authenticated by a mobile agent coming from a reliable server.  ...  A novel protocol is proposed to address the problem of user authentication to smartcards using biometric authentication instead of the usual PIN.  ...  It is a runtime environment for Java-based mobile agents in development at the Fraunhofer Institute for Computer Graphics, with its main focus on security.  ... 
doi:10.1007/11527923_48 fatcat:dlhg4ibb5zcqxbadbjsg3qtzeu

Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures

Guma Ali, Mussa Ally Dida, Anael Elikana Sam
2020 Future Internet  
It has also increased the security challenges associated with the current two-factor authentication (2FA) scheme for mobile money due to the high demand.  ...  This review study reveals that the current 2FA scheme for mobile money has security gaps that need to be addressed since it only uses a personal identification number (PIN) and a subscriber identity module  ...  Acknowledgments: The authors offer their heartfelt appreciation to the anonymous reviewers for their insightful suggestions and constructive comments.  ... 
doi:10.3390/fi12100160 fatcat:vc6qoiaf5rdjpi6nqf3j2iam6y

Managing secure authentication for standard mobile medical networks

Alexandru Egner, Alexandru Soceanu, Florica Moldoveanu
2012 2012 IEEE Symposium on Computers and Communications (ISCC)  
Index Terms-Interoperable mobile medical devices, biometric authentication, ISO/IEEE 11073-20601 I.  ...  However, the IEEE transferred the responsibility of implementing security solutions in future mobile health systems to the manufacturer.  ...  The paper describes a proposal for enhancing the ISO/IEEE 11073-20601 standard specification with a secure, easy to use and easy to implement mutual authentication procedure, based on biometric fingerprint  ... 
doi:10.1109/iscc.2012.6249327 dblp:conf/iscc/EgnerSM12 fatcat:dzmyqz5qdrgc3d43f4s3geiri4

Application of Biometric Security in Agent based Hotel Booking System - Android Environment

Wayne Lawrence, Suresh Sankaranarayanan
2012 International Journal of Information Engineering and Electronic Business  
The process of finding the finest hotel in central location is time consuming, information overload and overwhelming and in some cases poses a security risk to the client.  ...  client's identity using biometric datafinger print matching techniques.  Securely liaise with the security agent to obtain biometric information for authentication.  ...  device.  Now the prospective guest identity is authenticated using biometric security and credit card selection i.e VISA, MASTERCARD made for payment.  ... 
doi:10.5815/ijieeb.2012.03.08 fatcat:dwzfam7b4jf6dfgra5o3zr6rbu

Implementation of Multifactor based Authentication Scheme for Enhanced ATM Security

Macarthy O-Genseleke, Osuigbo Ebenezer, Chioma Chigozie-Okwum
2018 International Journal of Computer Applications  
The main objective of this work is to develop an authentication scheme that will enhance ATM security using multifactor based authentication scheme, which combines Biometric Fingerprint, PIN and QR-Code  ...  authentication.  ...  The new users register their mobile number, fingerprint for biometric authentication and other required personal details such as name and address.  ... 
doi:10.5120/ijca2018917400 fatcat:yw6ofugbofdjvntx6qkeykw53e

Improving Mobile Money Security with Two-Factor Authentication

Adam B.Mtaho
2015 International Journal of Computer Applications  
Security is a leading factor for establishing and maintaining customer trust in mobile money services (MMSs).  ...  This paper explores security challenges in MMSs and weaknesses associated with the current Mobile Money Authentication (MMA) method.  ...  [18] designed a mobile payment system integrated with biometric authentication model that provides the facility of mobile payments with increased security levels.  ... 
doi:10.5120/19198-0826 fatcat:dmuopgzxszbvhkzar2ycb4cuuy

SMASG: Secure Mobile Authentication Scheme for Global Mobility Network

Jihyeon Ryu, Hakjun Lee, Youngsook Lee, Dongho Won
2022 IEEE Access  
In this study, we discuss the weaknesses of AMAPG and propose a new three-factor authentication scheme called the secure mobile authentication scheme for GLOMONET (SMASG).  ...  Although implementing a secure mechanism in GLOMONET is a difficult and complex task due to the computational and processing limitations of most mobile devices, an authentication system is vital for secure  ...  To solve this problem, we used the user's biometric information for authentication.  ... 
doi:10.1109/access.2022.3157871 fatcat:p7plmwv2hjc47ca6deykzhzvhi

Parallel biometrics computing using mobile agents

J. You, D. Zhang, J. Cao, M. Guo
2003 2003 International Conference on Parallel Processing, 2003. Proceedings.  
This paper presents an efficient and effective approach to personal identification by parallel biometrics computing using mobile agents.  ...  To increase the speed and flexibility of the process, we use mobile agents as a navigational tool for parallel implementation in a distributed environment, which includes hierarchical biometric feature  ...  Acknowledgement The authors would like to thank for the partial support of a Hong Kong Government CERG Research Grant (B-Q518: PolyU5076/01E) and a Hong Kong Polytechnic University Research Grant (G-T613  ... 
doi:10.1109/icpp.2003.1240593 dblp:conf/icpp/YouZCG03 fatcat:km434jzmyvcbjjaqtwirdjwjca

Generate Context Metadata Based on Biometric System [chapter]

Antonia Azzini, Paolo Ceravolo, Ernesto Damiani, Cristiano Fugazza, Salvatore Reale, Massimiliano Torregiani
2005 Lecture Notes in Computer Science  
Biometric technology guarantees the maximal level of security, and it allows metadata definition with a personal authentication agent, based on knowledge, token and biometric-based processes.  ...  This paper presents the design and the architecure implementation of a system, which provides an user access control framework by means of multiple authentication methods.  ...  This framework uses semantic-aware metadata specification for enabling a policy enforcement mechanism that is able, together with biometric process, to distinguish the user profile from the context of  ... 
doi:10.1007/11552413_18 fatcat:rw7jaz7j3vf2vftxhkglemt6km

Efficient Multifactor Two-Server Authenticated Scheme under Mobile Cloud Computing

Ziyi Han, Li Yang, Shen Wang, Sen Mu, Qiang Liu
2018 Wireless Communications and Mobile Computing  
Aiming at the security problem due to the fingerprint information in the mobile payment environment, we propose a novel multifactor two-server authenticated scheme under mobile cloud computing (MTSAS).  ...  Now the biometrics-based (especially the fingerprint information) authentication technology has been extremely mature, and it is universally applied in the scenario of the mobile payment.  ...  The users, the fingerprint module, and the user agent are located in the mobile terminal. The fingerprint module is responsible for the fingerprint's collection, comparison, and secure storage.  ... 
doi:10.1155/2018/9149730 fatcat:snuxh6wzb5bkfec5ydwjxc7wna

Iris Recognition on Low Computational Power Mobile Devices [chapter]

Huiqi Lu, Chris R., Rupert C.D.
2011 Biometrics - Unique and Diverse Applications in Nature, Science, and Technology  
Accuracy Comparison among Biometrics Technologies (Ma et al, 2004) As shown in Table 1 , of all the different biometrics technologies that are used for human authentication and are readily accessible  ...  Many advanced mobile phones can explore the internet without using the BMP system, but the security level of the mobile phone is not yet ready for mobile shopping.  ...  Understanding some of the ways in which we use biometrics and for what specific purposes is what this book is all about.  ... 
doi:10.5772/16228 fatcat:k3kmzuxeibgabgkuiyysjhgbai

A Review on Authentication Techniques in Mobile Cloud Computing

Himadri Bhatt, Seema Joshi, Gujarat Technological University
2020 International Journal of Engineering Research and  
Therefore, cloud computing is predicted to bring an innovation in mobile computing, where the mobile devices can make use of clouds for processing, storage and other exhaustive operations.  ...  Security, particularly authentication in MCC may be a critical requirement in securing cloud based computations and communication.  ...  The Android is used for developing client agent because it can run a background monitoring service, and this ability is critical for data collection of implicit authentication. b) Securing mobile cloud  ... 
doi:10.17577/ijertv9is050158 fatcat:djamdo4in5hkbedm7l3k4j6mti

A Three-dimensional Framework for Security Implementation in Mobile Environments [chapter]

Bethuel Roberto Vinaja
2001 Advances in Information Security Management & Small Systems Security  
Specific security measures for mobile hardware, mobile users and mobile software are also discussed. Security, Mobility, Mobile Agents, Mobile Computers, Wireless  ...  This paper describes a framework that can be used to identify security requirements for a specific mobile environment.  ...  A better solution can be the use of biometric authentication.  ... 
doi:10.1007/0-306-47007-1_3 fatcat:j6fbt3rvzjb3lfqyxc5jcuxsgi

Towards end-to-end security in branchless banking

Saurabh Panjwani
2011 Proceedings of the 12th Workshop on Mobile Computing Systems and Applications - HotMobile '11  
In this paper, we make the case for designing mobile-based branchless banking systems which build security into the application layer and guarantee end-to-end security to system users.  ...  We present a threat model which captures the goals of authenticated transactions in these systems and then provide recommendations for solution design based on our model's requirements.  ...  For this reason, it is generally recommended that in user authentication tasks, OTPs not be used solitarily, but as a supplement to other tools like passwords or biometrics.  ... 
doi:10.1145/2184489.2184496 dblp:conf/wmcsa/Panjwani11 fatcat:53jylvdigvhzlbf42t56knhbdm

A Formally Verified Device Authentication Protocol Using Casper/FDR

Mahdi Aiash, Glenford Mapp, Raphael C.-W. Phan, Aboubaker Lasebae, Jonathan Loo
2012 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications  
In this situation, it is essential for users to trust their terminals and for all transactions using them to be secure.  ...  This paper analyses a number of the Authentication and Key Agreement protocols between the users and mobile terminals, then proposes a novel device authentication protocol.  ...  Biometric Information-Based Authentication For this stage, we assume that the Mobile terminal is equipped with a trusted Biometric information reader such as fingerprint reader.  ... 
doi:10.1109/trustcom.2012.27 dblp:conf/trustcom/AiashMPLL12 fatcat:kjpd4lklk5gllf4mmnn5upcpga
« Previous Showing results 1 — 15 out of 3,268 results