A novel identity authentication technique without trustworthy third-party based on fingerprint verification
文献类型:期刊论文
作者 | Li, Liang; Tian, Jie; Yang, Xin; Chen, H; Wang, FY; Yang, CC; Zeng, D; Chau, M; Chang, K |
刊名 | INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS |
出版日期 | 2006 |
卷号 | 3917期号:2006页码:175-176 |
关键词 | Novel Identity Authentication |
通讯作者 | Tian, Jie |
英文摘要 | Computer networks have evolved from close local networks to open interconnected networks and the operations from data communication to online transaction. As such, identity authentication is indispensable in today’s computing platform. Current identity authentication techniques primarily focus on Public Key Infrastructure (PKI) or Identity Based Encryption (IBE). However, these techniques authenticate users’ identity relying on tokens or keys and one or many trustworthy third-party(s) that require databases running online, with multiple points of vulnerability and low efficiency. |
WOS标题词 | Science & Technology ; Technology |
类目[WOS] | Computer Science, Information Systems ; Computer Science, Interdisciplinary Applications ; Computer Science, Theory & Methods |
研究领域[WOS] | Computer Science |
关键词[WOS] | HOMELAND SECURITY ; INTELLIGENCE ; INFORMATION |
收录类别 | SCI ; ISTP |
语种 | 英语 |
WOS记录号 | WOS:000237498000029 |
源URL | [http://ir.ia.ac.cn/handle/173211/9368] |
专题 | 自动化研究所_09年以前成果 |
作者单位 | Chinese Acad Sci, Grad Sch, Inst Automat, Beijing 100080, Peoples R China |
推荐引用方式 GB/T 7714 | Li, Liang,Tian, Jie,Yang, Xin,et al. A novel identity authentication technique without trustworthy third-party based on fingerprint verification[J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS,2006,3917(2006):175-176. |
APA | Li, Liang.,Tian, Jie.,Yang, Xin.,Chen, H.,Wang, FY.,...&Chang, K.(2006).A novel identity authentication technique without trustworthy third-party based on fingerprint verification.INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS,3917(2006),175-176. |
MLA | Li, Liang,et al."A novel identity authentication technique without trustworthy third-party based on fingerprint verification".INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS 3917.2006(2006):175-176. |
入库方式: OAI收割
来源:自动化研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。