AN EFFICIENT AND SECURE BIOMETRIC AUTHENTICATION SCHEME FOR M-COMMERCE
Journal: International Journal of Civil Engineering and Technology (IJCIET) (Vol.8, No. 12)Publication Date: 2017-12-26
Authors : R. THANDEESWARAN HAMID MCHEICK N. JEYANTHI HEMANT A AJAY T; RAJAN S;
Page : 429-437
Keywords : Authentication; Password; Impersonation; Session key; Biometric-based.;
Abstract
Communication in the remote situations are better known. Consequently, it is important to have a protected validation plan to shield exchanges in the middle of clients and servers from unlawful foes. Particularly, clients are individuals helpless against assaults and there are numerous validation plans with smart cards proposed to ensure them. As of late, Li et al have proposed a biometrics-based plan to upgrade security for confirmation. They guaranteed that their plan really is more secure than past ones and it can oppose different assaults. Then again, it is not genuine. Their plan is helpless against replay assault, man-in-the-center assault, stolen-verifier assault and doesn't have forward mystery property. Moreover, their plan can't ensure client's namelessness. Along these lines, foes can take character to re-register to get mystery key to imitate client. In this paper, we show a change to their plan so as to disengage such issues.
Other Latest Articles
- THE GOVERNMENT POLICY OF WATER RESOURCES CONSERVATION TO EMBODYING SUSTAINABLE DEVELOPMENT GOALS: STUDY IN KUNINGAN, INDONESIA
- MARKET PRICE AND DATA ANALYSIS
- TRAIN TIME SCHEDULING USING GENETIC ALGORITHM
- MANDATORY CORPORATE SOCIAL RESPONSIBILITY IN INDIA AND THE IMPACT ON WOMEN BOARD OF DIRECTORS: A REVIEW
- AN EXPERIMENT INVESTIGATION ON CONCRETE BY USING E-WASTE AS FINE AGGREGATE AND ENHANCED THE THERMAL INSULATION AND ULTRASONIC PROPERTIES
Last modified: 2018-05-11 23:19:15