中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
A novel identity authentication technique without trustworthy third-party based on fingerprint verification

文献类型:期刊论文

作者Li, Liang; Tian, Jie; Yang, Xin; Chen, H; Wang, FY; Yang, CC; Zeng, D; Chau, M; Chang, K
刊名INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS
出版日期2006
卷号3917期号:2006页码:175-176
关键词Novel Identity Authentication
通讯作者Tian, Jie
英文摘要Computer networks have evolved from close local networks to open interconnected
networks and the operations from data communication to online transaction. As such,
identity authentication is indispensable in today’s computing platform. Current identity
authentication techniques primarily focus on Public Key Infrastructure (PKI) or Identity
Based Encryption (IBE). However, these techniques authenticate users’ identity relying
on tokens or keys and one or many trustworthy third-party(s) that require databases
running online, with multiple points of vulnerability and low efficiency.
WOS标题词Science & Technology ; Technology
类目[WOS]Computer Science, Information Systems ; Computer Science, Interdisciplinary Applications ; Computer Science, Theory & Methods
研究领域[WOS]Computer Science
关键词[WOS]HOMELAND SECURITY ; INTELLIGENCE ; INFORMATION
收录类别SCI ; ISTP
语种英语
WOS记录号WOS:000237498000029
源URL[http://ir.ia.ac.cn/handle/173211/9368]  
专题自动化研究所_09年以前成果
作者单位Chinese Acad Sci, Grad Sch, Inst Automat, Beijing 100080, Peoples R China
推荐引用方式
GB/T 7714
Li, Liang,Tian, Jie,Yang, Xin,et al. A novel identity authentication technique without trustworthy third-party based on fingerprint verification[J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS,2006,3917(2006):175-176.
APA Li, Liang.,Tian, Jie.,Yang, Xin.,Chen, H.,Wang, FY.,...&Chang, K.(2006).A novel identity authentication technique without trustworthy third-party based on fingerprint verification.INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS,3917(2006),175-176.
MLA Li, Liang,et al."A novel identity authentication technique without trustworthy third-party based on fingerprint verification".INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS 3917.2006(2006):175-176.

入库方式: OAI收割

来源:自动化研究所

浏览0
下载0
收藏0
其他版本

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。