A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is
This paper presents fingerprint biometric-based self-authentication and deniable authentication schemes, which enable a receiver to identify source of the message but not to prove the identity of the sender to a third party. At first, we identify the security flaws of some recently proposed deniable authentication schemes by three application scenarios, and prove that those schemes are vulnerable to impersonation and eavesdropping attacks. For remedy, we propose two-factor-baseddoi:10.4103/0256-4602.50703 fatcat:ehbeyqdgsjhbdcxml2ycnafbki