[go: up one dir, main page]

Narender et al., 2024 - Google Patents

Authentication for Access Mechanisms for Cloud Services Based on Improved Elliptic Curve Cryptography

Narender et al., 2024

Document ID
1895379450150699428
Author
Narender M
Thaiyalnayaki S
Publication year
Publication venue
2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)

External Links

Snippet

In an era where cloud computing has become ubiquitous, ensuring robust security measures is imperative to safeguard sensitive data and maintain user trust. Traditional methods of authentication, such as passwords, are susceptible to various security threats …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
CN107925581B (en) Biometric authentication system and authentication server
Natgunanathan et al. Protection of privacy in biometric data
US8842887B2 (en) Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device
Mariño et al. A crypto-biometric scheme based on iris-templates with fuzzy extractors
US9384338B2 (en) Architectures for privacy protection of biometric templates
JP2004537103A (en) Application specific biometric templates
Mahesh Kumar et al. BMIAE: blockchain‐based multi‐instance iris authentication using additive ElGamal homomorphic encryption
CN114868358A (en) Privacy-preserving biometric authentication
Sui et al. Biometrics-based authentication: A new approach
KR20180003113A (en) Server, device and method for authenticating user
WO2023133907A1 (en) Privacy protection biometric authentication method and apparatus, and electronic device
Chiou Secure Method for Biometric‐Based Recognition with Integrated Cryptographic Functions
Kuznetsov et al. Deep learning-based biometric cryptographic key generation with post-quantum security
Sharma et al. Multimodal biometric user authentication using improved decentralized fuzzy vault scheme based on Blockchain network
Takahashi et al. Parameter management schemes for cancelable biometrics
Kwon et al. Comments on “Passbio: Privacy-preserving user-centric biometric authentication”
Kevenaar Protection of biometric information
JP7632477B2 (en) Recovery verification system, collation system, recovery verification method and program
Lin et al. A user authentication system using back-propagation network
Narender et al. Authentication for Access Mechanisms for Cloud Services Based on Improved Elliptic Curve Cryptography
Akanbi et al. Biocryptosystems for Template Protection: A Survey of Fuzzy Vault
Narayanankutty et al. Novel authentication system for personal and domestic network systems using image feature comparison and digital signatures
Constantinescu et al. Authentication model based on Multi-Agent System
Cheng et al. A Multi-server Authentication Scheme Based on Fuzzy Extractor
Tallapragada et al. Multilevel Network Security Based on Iris Biometric