Fortification of Transport Layer Security Protocol by Using Password and Fingerprint as Identity Authentication Parameters

Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
Whenever there is communication between Client and Server over a public link and resources are to be accessed from remote systems, then proving an identity becomes quiet complex because there is need of proper access rights with authentication. Complete security at the transport layer starts with proof of authentication, majority organizations only use password for security but this research paper would include one more tier of security to the transport layer security protocol by using fingerprints for identity authentication. Bio Hashing with the help of Minutiae Points at the fingerprints would be used for mutual authentication.

Find By Topic