Research Article
Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards
Table 1
Notations used in this paper.
| Notation | Description |
| | User i | | Trusted registration centre i | | Server i | | Attacker i | | Password of the user i | | Identity of the user i | | Biometric template of the user i | h( ) | A secure hash function | | A secret information maintained by the server | | x concatenates with y | | Exclusive-OR operation of x and y |
|
|