Laptikultham et al., 2015 - Google Patents
Modeling and analysis of two-factor authentication protocol for USB digital evidence acquisition devicesLaptikultham et al., 2015
- Document ID
- 12206181001969833504
- Author
- Laptikultham S
- Tritilanunt S
- Publication year
- Publication venue
- 2015 12th International Joint Conference on Computer Science and Software Engineering (JCSSE)
External Links
Snippet
This paper proposes two-factor authentication protocol for adding security layer to USB digital evidence acquisition devices, and preventing illegal usage of data stored in that devices from unauthorized users. By using one time password generated from unique …
- 238000004458 analytical method 0 title abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7454035B2 (en) | Methods and systems implemented by blockchain | |
Bera et al. | Designing blockchain-based access control protocol in IoT-enabled smart-grid system | |
Ali et al. | DaSCE: Data security for cloud environment with semi-trusted third party | |
Velliangiri et al. | An efficient lightweight privacy-preserving mechanism for industry 4.0 based on elliptic curve cryptography | |
CN103795534A (en) | Password-based authentication method and apparatus executing the method | |
CN101815091A (en) | Cipher providing equipment, cipher authentication system and cipher authentication method | |
CN107359998A (en) | A kind of foundation of portable intelligent password management system and operating method | |
CN110380859B (en) | Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol | |
Dey et al. | Message digest as authentication entity for mobile cloud computing | |
Chang et al. | A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment | |
Rana et al. | Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system | |
Feiri et al. | Efficient and secure storage of private keys for pseudonymous vehicular communication | |
CN109547413A (en) | The access control method of convertible data cloud storage with data source authentication | |
Salim et al. | A secure and timestamp-based communication scheme for cloud environment | |
CN107104804A (en) | A kind of platform integrity verification method and device | |
Raniyal et al. | Passphrase protected device‐to‐device mutual authentication schemes for smart homes | |
CN106257859A (en) | A kind of password using method | |
Chean et al. | Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing | |
Jang-Jaccard et al. | Portable key management service for cloud storage | |
Merzeh et al. | GDPR compliance IoT authentication model for smart home environment | |
Magdum et al. | A secure data transfer algorithm for USB mass storage devices to protect documents | |
CN110086627B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and time stamp | |
CN110176997B (en) | Quantum communication service station AKA key negotiation method and system | |
Laptikultham et al. | Modeling and analysis of two-factor authentication protocol for USB digital evidence acquisition devices | |
Xia et al. | Design of secure FTP system |