Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server
نویسندگان
چکیده
Fuzzy systems can aid in diminishing uncertainty and noise from biometric security applications by providing an intelligent layer to the existing physical make them reliable. In absence of such fuzzy systems, a little random perturbation captured human biometrics could disrupt whole system, which may even decline authentication requests legitimate entities during protocol execution. literature, few logic-based schemes have been presented; however, they lack significant features including perfect forward secrecy (PFS), untraceability, resistance known attacks. This article, therefore, proposes novel two-factor enabling efficient secure combination physically unclonable functions, object analogous fingerprint, with user employing extractor-based procedures loop. enables participants achieve PFS. The proposed scheme is tested using well-known real-or-random model. performance analysis signifies fact that not only offers PFS, anonymity participants, but also resilient attacks light-weight symmetric operations, makes it imperative advancement category reliable solutions.
منابع مشابه
Secure Remote Access to an Internal Web Server Secure Remote Access to an Internal Web Server
We address the problem of secure remote access to a site's internal web server from outside the rewall. The idea is to give authorized users access to sensitive information, while protecting the information from others. We implemented our solution using a one-time password scheme for client authentication and SSL for conndentiality. Our main design considerations were security, performance, eas...
متن کاملSecure SQL Server - Enabling Secure Access to Remote Relational Data
The Secure SQL Server – SecSS, is a technology primarily developed to enable self-‐service governance of states, as described in (Paulin 2012). Self-‐service governance is a novel model of governance that rejects service-‐based public administration BLOCKIN
متن کاملSecure Remote Access to an Internal Web Server
We address the problem of secure remote access to a site's internal web server from outside the rewall. The goal is to give authorized users access to sensitive information, while protecting the information from others. We implemented our solution using a one-time password scheme for client authentication and SSL for con dentiality. Our main design considerations were security, performance, eas...
متن کاملUser Oriented Access to Secure Biomedical Resources through the Grid
The life science domain is typified by heterogeneous data sets that are evolving at an exponential rate. Numerous post-genomic databases and areas of postgenomic life science research have been established and are being actively explored. Whilst many of these databases are public and freely accessible, it is often the case that researchers have data that is not so freely available and access to...
متن کاملqfd planning with cost consideration in fuzzy environment
در عصر حاضر که رقابت بین سازمان ها بسیار گسترش یافته است، مطالعه و طرحریزی سیستم های تولیدی و خدماتی به منظور بهینه سازی عملکرد آنها اجتناب ناپذیر می باشد. بخش عمده ای از رقابت پذیری سازمان ها نتیجه رضایتمندی مشتریان آنها است. میزان موفقیت سازمان های امروزی به تلاش آنها در جهت شناسایی خواسته ها و نیازهای مشتریان و ارضای این نیازها بستگی دارد. از طرفی کوتاه کردن زمان ارائه محصول/خدمات به مشتریان...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Reliability
سال: 2021
ISSN: ['1558-1721', '0018-9529']
DOI: https://doi.org/10.1109/tr.2020.3021794