Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 19
Page No. 8027 - 8033

Towards One-Time Biometric-Message Authentication Code in Cloud Computing

Authors : Zainab Amin Abduljabbar, Zaid Ameen Abduljabbar and Rana Jassim Mohammed

References

Castiglione, A., A. De Santis, A. Castiglione and F. Palmieri, 2014. An efficient and transparent one-time authentication protocol with non-interactive key scheduling and update. Proceedings of the 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA’14), May 13-16, 2014, IEEE, Victoria, British Columbia Canada, ISBN:978-1-4799-3629-8, pp: 351-358.

Dinh, H.T., C. Lee, D. Niyato and P. Wang, 2013. A survey of mobile cloud computing: architecture, applications and approaches. Wirel. Commun. Mob. Comput., 13: 1587-1611.
CrossRef  |  Direct Link  |  

Handschuh, H., 2011. Sha-0, Sha-1, Sha-2 (Secure Hash Algorithm). In: Encyclopedia of Cryptography and Security, Tilborg, H.C.A.V. and S. Jajodia (Eds.). Springer, Boston, Massachusetts, ISBN:978-1-4419-5905-8, pp: 1190-1193.

Impedovo, D. and G. Pirlo, 2008. Automatic signature verification: The state of the art. IEEE. Trans. Syst. Man Cybern. Part C. Appl. Rev., 38: 609-635.
CrossRef  |  Direct Link  |  

Liu, Z., H.S. Lallie, L. Liu, Y. Zhan and K. Wu, 2011. A hash-based secure interface on plain connection. Proceedings of the 6th International ICST Conference on Communications and Networking in China (CHINACOM’11), August 17-19, 2011, IEEE, Harbin, China, ISBN:978-1-4577-0100-9, pp: 1236-1239.

Miller, V.S., 1986. Advances in Cryptology-CRYPTO’85 Proceedings. Springer, Berlin, Germany,.

Prabhakar, S., S. Pankanti and A.K. Jain, 2003. Biometric recognition: Security and privacy concerns. IEEE Secur. Priv., 1: 33-42.
CrossRef  |  Direct Link  |  

Rabadi, N.M. and S.M. Mahmud, 2008. Drivers anonymity with a short message length for vehicle-to-vehicle communications network. Proceedings of the 5th IEEE Conference on Consumer Communications and Networking (CCNC’08), January10-12, 2008, IEEE, Las Vegas, Nevada, ISBN:978-1-4244-1456-7, pp: 132-133.

Shen, J.J. and K.T. Liu, 2014. A novel approach by applying image authentication technique on a digital document. Proceedings of the 2014 International Symposium on Computer, Consumer and Control (IS3C’14), June 10-12, 2014, IEEE, Taichung, Taiwan, ISBN:978-1-4799-5277-9, pp: 119-122.

Stallings, W., 2013. Digital signature algorithms. Cryptologia, 37: 311-327.
Direct Link  |  

TamilSelvan, R., I. Prathap, A. Ramalingam and S. Raghavan, 2009. A novel approach to watermark text documents based on Eigen values. Proceedings of the 2009 International Conference on Network and Service Security (N2S'09), June 24-26, 2009, IEEE, Paris, France, ISBN:978-2-9532-4431-1, pp: 1-5.

Velte, T., A. Velte and R. Elsenpeter, 2009. Cloud Computing: A Practical Approach. McGraw-Hill, New York, USA.,.

Wegman, M. and J. Carter, 1981. New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci., 22: 265-279.

Xu, J., D. Wang, D. Lin and W. Wu, 2006. An efficient one-key carter-wegman message authentication code. Proceedings of the 2006 International Conference on Computational Intelligence and Security Vol. 2, November 3-6, 2006, IEEE, Guangzhou, China, ISBN:1-4244-0604-8, pp: 1331-1334.

Zhao, Z.M., Y.F. Liu, H. Li and Y.X. Yang, 2008. An efficient user-to-user authentication scheme in peer-to-peer system. Proceedings of the 1st International Conference on Intelligent Networks and Intelligent Systems (ICINIS'08), November 1-3, 2008, IEEE, Wuhan, China, ISBN:978-0-7695-3391-9, pp: 263-266.

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved