{"title":"基于智能卡的认证方案的比较分析与改进","authors":"Narendra Panwar, M. Rauthan, Amit Agarwal","doi":"10.1109/IC3.2016.7880250","DOIUrl":null,"url":null,"abstract":"Interconnected computer systems and services using networks have improved the dependence on the stored accumulated data. Interconnected systems via network, in turn, could expedite security attacks. Recently, network security and cryptography techniques have evolved, leading to the advancement of biometric-based smart cards technique to implement the security of networks. In this paper, we demonstrated that our proposed scheme withstands the vulnerabilities pointed out by Francisco et al. schemes. Consequently, our scheme completes all the recent security requirement.","PeriodicalId":294210,"journal":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A comparative analysis and improvement of smart card based authentication scheme\",\"authors\":\"Narendra Panwar, M. Rauthan, Amit Agarwal\",\"doi\":\"10.1109/IC3.2016.7880250\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Interconnected computer systems and services using networks have improved the dependence on the stored accumulated data. Interconnected systems via network, in turn, could expedite security attacks. Recently, network security and cryptography techniques have evolved, leading to the advancement of biometric-based smart cards technique to implement the security of networks. In this paper, we demonstrated that our proposed scheme withstands the vulnerabilities pointed out by Francisco et al. schemes. Consequently, our scheme completes all the recent security requirement.\",\"PeriodicalId\":294210,\"journal\":{\"name\":\"2016 Ninth International Conference on Contemporary Computing (IC3)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Ninth International Conference on Contemporary Computing (IC3)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3.2016.7880250\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Ninth International Conference on Contemporary Computing (IC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3.2016.7880250","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A comparative analysis and improvement of smart card based authentication scheme
Interconnected computer systems and services using networks have improved the dependence on the stored accumulated data. Interconnected systems via network, in turn, could expedite security attacks. Recently, network security and cryptography techniques have evolved, leading to the advancement of biometric-based smart cards technique to implement the security of networks. In this paper, we demonstrated that our proposed scheme withstands the vulnerabilities pointed out by Francisco et al. schemes. Consequently, our scheme completes all the recent security requirement.