Show simple item record

dc.contributor.authorMakori, Abanti Cyrus
dc.date.accessioned2012-10-16T11:44:22Z
dc.date.available2012-10-16T11:44:22Z
dc.date.issued2009
dc.identifier.isbn978-9970-02-738-5
dc.identifier.urihttp://hdl.handle.net/10570/849
dc.description.abstractThe modern Information Technology evolution demands the use of computer networks with strict security performance. The password-based authentication system and the token-based systems that are current deployed, are not able to meet this performance. Achieving higher levels of security requires authentication. Today’s standard security mechanism is a password that you create, remember it, and change it frequently. These passwords are not foolproof because they can be stolen, forgotten, cracked, sniffed and even tampered with. In fact it is quicker to gain access to electronically held data, copy or print it out than it is to search through or photocopy manually held files. The problems of traditional personal authentication systems may be solved by biometric systems. Biometric identification is extremely effective authentication. It is an important weapon to protect against credit card fraud and phantom withdraws. Biometrics can identify a person’s unique physical characteristics, including fingerprints, facial features, voice pattern, retinal, irises DNA and keystroke. The problem with biometrics approach is that the biometric properties cannot reasonably be kept secret. Although biometric systems have advantages over traditional system, one of the unsolved issues is how we can combine cryptography with biometrics to increase overall system security The objectives of this paper are: 1. To critically examine the attacks on traditional personal identification authentication systems in order to determine the risks of using password based authentication. 2. To examine the biometric technologies and how they are used in authentication with an aim to improvise a secure model. 3. To apply cryptographic techniques in biometric system with a view to increase its security on networked data access.en_US
dc.language.isoenen_US
dc.publisherFountain Publishers, Kampala.en_US
dc.relation.ispartofseriesThe fifth conference in the ICCIR series;1
dc.subjectSecure authenticationen_US
dc.titleIntegration of biometrics with cryptographic techniques for secure authentication of networked data accessen_US
dc.typeConference paperen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record