[go: up one dir, main page]

Kwon, 2003 - Google Patents

Robust Software Tokens—Yet another method for securing user's digital identity

Kwon, 2003

View PDF
Document ID
11684502118676243850
Author
Kwon T
Publication year
Publication venue
Australasian Conference on Information Security and Privacy

External Links

Snippet

This paper presents a robust software token that was developed to protect user's digital identity by simple software-only techniques. This work is closely related to Hoover and Kausik's software smart cards, and MacKenzie and Reiter's networked cryptographic …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Similar Documents

Publication Publication Date Title
US7359507B2 (en) Server-assisted regeneration of a strong secret from a weak secret
JP4833489B2 (en) System, method and software for remote password authentication using multiple servers
US7047408B1 (en) Secure mutual network authentication and key exchange protocol
CN1871810B (en) Authentication system and remote decentralized storage system
US8589693B2 (en) Method for two step digital signature
KR20070104939A (en) Small public-key based digital signature for authentication
EP2945347B1 (en) Methods and devices for securing keys when key-management processes are subverted by an adversary
Yoon et al. A new authentication scheme for session initiation protocol
Shakiba Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks
Giri et al. An improved remote user authentication scheme with smart cards using bilinear pairings
Azrour et al. Cryptanalysis of Farash et al.'s SIP authentication protocol
Braeken PUF‐Based Authentication and Key Exchange for Internet of Things
Chou et al. Improvement of Manik et al.¡¦ s remote user authentication scheme
Elkamchouchi et al. An efficient proxy signcryption scheme based on the discrete logarithm problem
Kwon Virtual software tokens-a practical way to secure PKI roaming
Chen et al. Blockchain as a CA: A provably secure signcryption scheme leveraging blockchains
Kwon Robust Software Tokens—Yet another method for securing user’s digital identity
Modares et al. Make a Secure Connection Using Elliptic Curve Digital Signature
Vesterås Analysis of key agreement protocols
Yeun Design, analysis and applications of cryptographic techniques
Salem et al. AN IMPROVED AND EFFICIENT RSA-BASED AUTHENTICATION SCHEME FOR HEALTHCARE SYSTEMS.
Vo et al. Security enhancement of a remote user authentication scheme using bilinear pairings and ECC
Abdelsatir et al. On the Implementation of a Secure Email System with ID-based Encryption
Kwon Robust Software Tokens-Yet Another Method for Securing User’s Digital Identity (Extended and Revised: Ver. 0.9)
Kwon On the difficulty of protecting private keys in software