{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T16:54:41Z","timestamp":1723568081428},"reference-count":40,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2010,12,3]],"date-time":"2010-12-03T00:00:00Z","timestamp":1291334400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2011,5]]},"abstract":"Abstract<\/jats:title>With fast evolution of mobile devices and mobile network, the need of protecting user sensitive information locally and performing secure user authentication remotely become evermore increasing. Bio\u2010cryptography is emerging as a powerful solution which can combine the advantages of conventional cryptography and biometric security. In this paper, we present an efficient bio\u2010cryptographic security protocol designed for client\/server authentication in current mobile computing environment, with a reasonable assumption that server is secure. In this protocol, fingerprint biometric is used in user verification, protected by a computationally efficient Public Key Infrastructure (PKI) scheme, Elliptic Curve Cryptography (ECC). The genuine fingerprint information is hidden in the feature vault which is the mixture of genuine and chaff features. Fingerprint features are not only used for biometric verification but also for cryptographic key generation. Our security analysis shows that the proposed protocol can provide a secure and trustworthy authentication of remote mobile users over insecure network. Experimental results on public domain database show an acceptable verification performance. We also tested the computational costs and efficiency of our protocol on the CLDC emulator using Java ME (previous J2ME) programming technology. The simulation results prove that the proposed protocol suits current mobile environment. Copyright \u00a9 2010 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.225","type":"journal-article","created":{"date-parts":[[2010,12,3]],"date-time":"2010-12-03T15:36:30Z","timestamp":1291390590000},"page":"487-499","source":"Crossref","is-referenced-by-count":75,"title":["A fingerprint based bio\u2010cryptographic security protocol designed for client\/server authentication in mobile computing environment"],"prefix":"10.1002","volume":"4","author":[{"given":"Kai","family":"Xi","sequence":"first","affiliation":[]},{"given":"Tohari","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Fengling","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2010,12,3]]},"reference":[{"key":"e_1_2_7_2_2","unstructured":"ShawK.Data on PDAs mostly unprotected.Network World Fusion. Available fromhttp:\/\/www.nwfusion.com\/2004."},{"key":"e_1_2_7_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_7_4_2","first-page":"203","volume-title":"Mathematics of Computation 48","author":"Koblitz N.","year":"1987"},{"key":"e_1_2_7_5_2","unstructured":"MillerV.Use of elliptic curves in cryptography CRYPTO 85 1985."},{"key":"e_1_2_7_6_2","volume-title":"Handbook of Fingerprint Recognition","author":"Maltoni D","year":"2003"},{"key":"e_1_2_7_7_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.304770"},{"key":"e_1_2_7_8_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.304705"},{"key":"e_1_2_7_9_2","volume-title":"ICSA Guide to Cryptography","author":"Soutar C","year":"1999"},{"key":"e_1_2_7_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.250"},{"key":"e_1_2_7_11_2","unstructured":"SavvidesM VijayakumarB.Cancellable Biometric Filters forFace Recognition.Proceedings of IEEE International Conference Pattern Recognition volume 3 pages 922\u2010925 Cambridge UK August2004."},{"key":"e_1_2_7_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"e_1_2_7_13_2","doi-asserted-by":"crossref","unstructured":"TeohA TohK YipW.2NDiscretisation of BioPhasor in Cancellable Biometrics Proceedings of Second International Conference on Biometrics Seoul South Korea 2007;435\u2013444.","DOI":"10.1007\/978-3-540-74549-5_46"},{"key":"e_1_2_7_14_2","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"e_1_2_7_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"e_1_2_7_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/11527923_32"},{"key":"e_1_2_7_17_2","doi-asserted-by":"crossref","unstructured":"XiK HuJ.Biometric mobile template protection: a composite feature based fingerprint fuzzy vault IEEE International Conference on Communications Dresden Germany 2009.","DOI":"10.1109\/ICC.2009.5198785"},{"key":"e_1_2_7_18_2","unstructured":"http:\/\/www.upek.com\/solutions\/physical\/chipsets_sensors.asp"},{"key":"e_1_2_7_19_2","unstructured":"http:\/\/www.authentec.com\/products\u2010accesscontrol\u2010aes2510.cfm"},{"key":"e_1_2_7_20_2","unstructured":"http:\/\/avnetexpress.avnet.com\/store\/em\/EMController\/Sensors\u2010and\u2010Transducers\u2010Misc\/UPEK\/TCS5BB6A0\/_\/R\u20109066904\/A\u20109066904\/An\u20100?action=part&catalogId=500201&langId=\u20101&storeId=500201"},{"key":"e_1_2_7_21_2","unstructured":"http:\/\/www.neurotechnology.com\/verifinger.html"},{"key":"e_1_2_7_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1003"},{"key":"e_1_2_7_23_2","unstructured":"FIPS. 180\u20102: Secure Hash Standard (SHS) 25 February2004."},{"key":"e_1_2_7_24_2","unstructured":"Watson. NIST special database 24 live\u2010scan digital video fingerprint database.Technical report U.S. National Institute of Standards and Technology 1998."},{"key":"e_1_2_7_25_2","unstructured":"MaioD MaltoniD CappelliR WaymanJL JainAK.\u2018FV C2002: Second Fingerprint Verification Competition \u2019 ICPR vol. 3 pp. 30811 16th International Conference on Pattern Recognition (ICPR'02)Volume 3 2002."},{"key":"e_1_2_7_26_2","doi-asserted-by":"crossref","unstructured":"NandakumarK JainAK PankantiS.Fingerprint\u2010based Fuzzy Vault: Implementation and Performance IEEE Transactions on on Informatics Forensics and Security vol. 2 no. 4 pp. 744\u2010757 December2007.","DOI":"10.1109\/TIFS.2007.908165"},{"key":"e_1_2_7_27_2","unstructured":"Sun Website URL:http:\/\/java.sun.com\/2009."},{"key":"e_1_2_7_28_2","unstructured":"Bouncy Castle.Lightweight API The Legion of the Bouncy Castle 2008."},{"key":"e_1_2_7_29_2","unstructured":"Certicom.SEC 2: Recommended Elliptic Curve Domain Parameters Certicom Corp. 2000."},{"key":"e_1_2_7_30_2","doi-asserted-by":"crossref","unstructured":"AhmadT HuJ HanS.Efficient Mobile Voting System Security Scheme based on Elliptic Curve Cryptography International Workshop on Intelligent Decision Support Systems and Applications in Networked and Distributed Systems IEEE 3rd International Conference on Network & System Security (NSS09) Gold Coast Australia October2009;19\u201321.","DOI":"10.1109\/NSS.2009.57"},{"key":"e_1_2_7_31_2","doi-asserted-by":"crossref","unstructured":"HanF HuJ YuX FengY ZhouJ.A novel hybrid crypto\u2010biometric authentication scheme for ATM based banking applications IAPR International Conference on Biometrics (ICB2006) Hong Kong China 5\u20107 January 2006. Published at Lecture Notes in Computer Science Springer vol. 3832\/2005 2005;675\u2013681.","DOI":"10.1007\/11608288_90"},{"key":"e_1_2_7_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.01.003"},{"key":"e_1_2_7_33_2","article-title":"Global Ridge Orientation Modelling for Partial Fingerprint Identification","author":"Wang Y","year":"2010","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_2_7_34_2","first-page":"274","article-title":"A hybrid public key infrastructure solution (HPKI) for HIPAA privacy\/security regulations. Special Issue on Information and Communications Security, Privacy and Trust: Standards and Regulations","author":"Hu J","journal-title":"Computer Standards & Interfaces"},{"key":"e_1_2_7_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.05.004"},{"key":"e_1_2_7_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.02.009"},{"key":"e_1_2_7_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.4804323"},{"key":"e_1_2_7_38_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.5"},{"key":"e_1_2_7_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2006.06.082"},{"key":"e_1_2_7_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2006.07.030"},{"key":"e_1_2_7_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2007.903207"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.225","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,7]],"date-time":"2023-10-07T18:33:53Z","timestamp":1696703633000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.225"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,3]]},"references-count":40,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2011,5]]}},"alternative-id":["10.1002\/sec.225"],"URL":"https:\/\/doi.org\/10.1002\/sec.225","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12,3]]}}}