Fingerprint Traits and RSA Algorithm Fusion Technique

Key generation
DOI: 10.1109/cisis.2012.116 Publication Date: 2012-07-31T21:51:28Z
ABSTRACT
The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI are private/public generated through RSA or similar algorithms. solution embeds information the In addition corresponding private key depends physical behavioural features and it can be when is needed. Starting from fingerprint acquisition, identifier extracted, cyphered, stored in tamper-resistant smart card to overcome problems of centralized databases. Biometric then used for user authentication public/private generation. initial trials have shown that distinctive power accuracy, assuring unique each authenticated user.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (22)
CITATIONS (7)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....