{"id":"https://openalex.org/W2150250664","doi":"https://doi.org/10.1002/sec.225","title":"A fingerprint based bio\u2010cryptographic security protocol designed for client/server authentication in mobile computing environment","display_name":"A fingerprint based bio\u2010cryptographic security protocol designed for client/server authentication in mobile computing environment","publication_year":2010,"publication_date":"2010-12-03","ids":{"openalex":"https://openalex.org/W2150250664","doi":"https://doi.org/10.1002/sec.225","mag":"2150250664"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/sec.225","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":"https://doi.org/10.1002/sec.225","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091725820","display_name":"Kai Xi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kai Xi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075903779","display_name":"Tohari Ahmad","orcid":"https://orcid.org/0000-0002-3390-0756"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tohari Ahmad","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021052552","display_name":"Fengling Han","orcid":"https://orcid.org/0000-0001-8756-7197"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fengling Han","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiankun Hu","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100,"provenance":"doaj"},"apc_paid":null,"fwci":9.774,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":96,"citation_normalized_percentile":{"value":0.999769,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"4","issue":"5","first_page":"487","last_page":"499"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Recognition and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Recognition and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication Methods and Security Measures","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":0.9947,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.53958},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication","score":0.532206},{"id":"https://openalex.org/keywords/graphical-passwords","display_name":"Graphical Passwords","score":0.517119},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint","score":0.516547},{"id":"https://openalex.org/keywords/image-authentication","display_name":"Image Authentication","score":0.513365}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8595162},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.6130845},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5713813},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5259388},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5142193},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.49695066},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4784522},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.45571968},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44848502},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4100174},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2519508},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/sec.225","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/sec.225","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.64}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":33,"referenced_works":["https://openalex.org/W1508278500","https://openalex.org/W1564185599","https://openalex.org/W1577532209","https://openalex.org/W1639795441","https://openalex.org/W1996360405","https://openalex.org/W2003736153","https://openalex.org/W2006862475","https://openalex.org/W2033223053","https://openalex.org/W2034440963","https://openalex.org/W2036378739","https://openalex.org/W2057697429","https://openalex.org/W2068716682","https://openalex.org/W2086586609","https://openalex.org/W2095773423","https://openalex.org/W2106137793","https://openalex.org/W2110401929","https://openalex.org/W2118498934","https://openalex.org/W2125587922","https://openalex.org/W2127147470","https://openalex.org/W2132547622","https://openalex.org/W2139731313","https://openalex.org/W2144596760","https://openalex.org/W2146813141","https://openalex.org/W2148016001","https://openalex.org/W2148448414","https://openalex.org/W2149700829","https://openalex.org/W2153047060","https://openalex.org/W2166011144","https://openalex.org/W2500047839","https://openalex.org/W3160027900","https://openalex.org/W4205295188","https://openalex.org/W4232836212","https://openalex.org/W4285226730"],"related_works":["https://openalex.org/W2994213367","https://openalex.org/W2763050151","https://openalex.org/W2104283649","https://openalex.org/W2036546368","https://openalex.org/W2001371286","https://openalex.org/W1955053247","https://openalex.org/W1915479549","https://openalex.org/W1606380665","https://openalex.org/W1538205761","https://openalex.org/W1484754451"],"abstract_inverted_index":{"Abstract":[0],"With":[1],"fast":[2],"evolution":[3],"of":[4,12,39,110,145,171],"mobile":[5,8,61,147,195],"devices":[6],"and":[7,18,42,112,142,169],"network,":[9],"the":[10,37,103,108,135,166,175,190],"need":[11],"protecting":[13],"user":[14,21,80],"sensitive":[15],"information":[16,99],"locally":[17],"performing":[19],"secure":[20,141],"authentication":[22,58,144],"remotely":[23],"become":[24],"evermore":[25],"increasing.":[26],"Bio\u2010cryptography":[27],"is":[28,70,77,100,107],"emerging":[29],"as":[30],"a":[31,65,84,140],"powerful":[32],"solution":[33],"which":[34,106],"can":[35,138],"combine":[36],"advantages":[38],"conventional":[40],"cryptography":[41],"biometric":[43,76,122],"security.":[44],"In":[45,72],"this":[46,73],"paper,":[47],"we":[48],"present":[49],"an":[50,159],"efficient":[51,86],"bio\u2010cryptographic":[52],"security":[53,131],"protocol":[54,137,173,192],"designed":[55],"for":[56,121,126],"client/server":[57],"in":[59,79,102],"current":[60,194],"computing":[62],"environment,":[63],"with":[64],"reasonable":[66],"assumption":[67],"that":[68,134,189],"server":[69],"secure.":[71],"protocol,":[74],"fingerprint":[75,98],"used":[78,120],"verification,":[81],"protected":[82],"by":[83],"computationally":[85],"Public":[87],"Key":[88],"Infrastructure":[89],"(PKI)":[90],"scheme,":[91],"Elliptic":[92],"Curve":[93],"Cryptography":[94],"(ECC).":[95],"The":[96,185],"genuine":[97,111],"hidden":[101],"feature":[104],"vault":[105],"mixture":[109],"chaff":[113],"features.":[114],"Fingerprint":[115],"features":[116],"are":[117],"not":[118],"only":[119],"verification":[123,161],"but":[124],"also":[125,164],"cryptographic":[127],"key":[128],"generation.":[129],"Our":[130],"analysis":[132],"shows":[133],"proposed":[136,191],"provide":[139],"trustworthy":[143],"remote":[146],"users":[148],"over":[149],"insecure":[150],"network.":[151],"Experimental":[152],"results":[153,187],"on":[154,174],"public":[155],"domain":[156],"database":[157],"show":[158],"acceptable":[160],"performance.":[162],"We":[163],"tested":[165],"computational":[167],"costs":[168],"efficiency":[170],"our":[172],"CLDC":[176],"emulator":[177],"using":[178],"Java":[179],"ME":[180],"(previous":[181],"J2ME)":[182],"programming":[183],"technology.":[184],"simulation":[186],"prove":[188],"suits":[193],"environment.":[196],"Copyright":[197],"\u00a9":[198],"2010":[199],"John":[200],"Wiley":[201],"&":[202],"Sons,":[203],"Ltd.":[204]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2150250664","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":13},{"year":2014,"cited_by_count":13},{"year":2013,"cited_by_count":15},{"year":2012,"cited_by_count":8}],"updated_date":"2024-11-29T22:57:46.388885","created_date":"2016-06-24"}