Laptikultham et al., 2015 - Google Patents

Modeling and analysis of two-factor authentication protocol for USB digital evidence acquisition devices

Laptikultham et al., 2015

Document ID
12206181001969833504
Author
Laptikultham S
Tritilanunt S
Publication year
Publication venue
2015 12th International Joint Conference on Computer Science and Software Engineering (JCSSE)

External Links

Snippet

This paper proposes two-factor authentication protocol for adding security layer to USB digital evidence acquisition devices, and preventing illegal usage of data stored in that devices from unauthorized users. By using one time password generated from unique …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Similar Documents

Publication Publication Date Title
JP7454035B2 (en) Methods and systems implemented by blockchain
Bera et al. Designing blockchain-based access control protocol in IoT-enabled smart-grid system
Ali et al. DaSCE: Data security for cloud environment with semi-trusted third party
Velliangiri et al. An efficient lightweight privacy-preserving mechanism for industry 4.0 based on elliptic curve cryptography
CN103795534A (en) Password-based authentication method and apparatus executing the method
CN101815091A (en) Cipher providing equipment, cipher authentication system and cipher authentication method
CN107359998A (en) A kind of foundation of portable intelligent password management system and operating method
CN110380859B (en) Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol
Dey et al. Message digest as authentication entity for mobile cloud computing
Chang et al. A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment
Rana et al. Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system
Feiri et al. Efficient and secure storage of private keys for pseudonymous vehicular communication
CN109547413A (en) The access control method of convertible data cloud storage with data source authentication
Salim et al. A secure and timestamp-based communication scheme for cloud environment
CN107104804A (en) A kind of platform integrity verification method and device
Raniyal et al. Passphrase protected device‐to‐device mutual authentication schemes for smart homes
CN106257859A (en) A kind of password using method
Chean et al. Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
Jang-Jaccard et al. Portable key management service for cloud storage
Merzeh et al. GDPR compliance IoT authentication model for smart home environment
Magdum et al. A secure data transfer algorithm for USB mass storage devices to protect documents
CN110086627B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and time stamp
CN110176997B (en) Quantum communication service station AKA key negotiation method and system
Laptikultham et al. Modeling and analysis of two-factor authentication protocol for USB digital evidence acquisition devices
Xia et al. Design of secure FTP system