Narender et al., 2024 - Google Patents
Authentication for Access Mechanisms for Cloud Services Based on Improved Elliptic Curve CryptographyNarender et al., 2024
- Document ID
- 1895379450150699428
- Author
- Narender M
- Thaiyalnayaki S
- Publication year
- Publication venue
- 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)
External Links
Snippet
In an era where cloud computing has become ubiquitous, ensuring robust security measures is imperative to safeguard sensitive data and maintain user trust. Traditional methods of authentication, such as passwords, are susceptible to various security threats …
- 230000007246 mechanism 0 title abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107925581B (en) | Biometric authentication system and authentication server | |
Natgunanathan et al. | Protection of privacy in biometric data | |
US8842887B2 (en) | Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device | |
Mariño et al. | A crypto-biometric scheme based on iris-templates with fuzzy extractors | |
US9384338B2 (en) | Architectures for privacy protection of biometric templates | |
JP2004537103A (en) | Application specific biometric templates | |
Mahesh Kumar et al. | BMIAE: blockchain‐based multi‐instance iris authentication using additive ElGamal homomorphic encryption | |
CN114868358A (en) | Privacy-preserving biometric authentication | |
Sui et al. | Biometrics-based authentication: A new approach | |
KR20180003113A (en) | Server, device and method for authenticating user | |
WO2023133907A1 (en) | Privacy protection biometric authentication method and apparatus, and electronic device | |
Chiou | Secure Method for Biometric‐Based Recognition with Integrated Cryptographic Functions | |
Kuznetsov et al. | Deep learning-based biometric cryptographic key generation with post-quantum security | |
Sharma et al. | Multimodal biometric user authentication using improved decentralized fuzzy vault scheme based on Blockchain network | |
Takahashi et al. | Parameter management schemes for cancelable biometrics | |
Kwon et al. | Comments on “Passbio: Privacy-preserving user-centric biometric authentication” | |
Kevenaar | Protection of biometric information | |
JP7632477B2 (en) | Recovery verification system, collation system, recovery verification method and program | |
Lin et al. | A user authentication system using back-propagation network | |
Narender et al. | Authentication for Access Mechanisms for Cloud Services Based on Improved Elliptic Curve Cryptography | |
Akanbi et al. | Biocryptosystems for Template Protection: A Survey of Fuzzy Vault | |
Narayanankutty et al. | Novel authentication system for personal and domestic network systems using image feature comparison and digital signatures | |
Constantinescu et al. | Authentication model based on Multi-Agent System | |
Cheng et al. | A Multi-server Authentication Scheme Based on Fuzzy Extractor | |
Tallapragada et al. | Multilevel Network Security Based on Iris Biometric |