Kwon, 2003 - Google Patents
Robust Software Tokens—Yet another method for securing user's digital identityKwon, 2003
View PDF- Document ID
- 11684502118676243850
- Author
- Kwon T
- Publication year
- Publication venue
- Australasian Conference on Information Security and Privacy
External Links
Snippet
This paper presents a robust software token that was developed to protect user's digital identity by simple software-only techniques. This work is closely related to Hoover and Kausik's software smart cards, and MacKenzie and Reiter's networked cryptographic …
- 238000000034 method 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7359507B2 (en) | Server-assisted regeneration of a strong secret from a weak secret | |
| JP4833489B2 (en) | System, method and software for remote password authentication using multiple servers | |
| US7047408B1 (en) | Secure mutual network authentication and key exchange protocol | |
| CN1871810B (en) | Authentication system and remote decentralized storage system | |
| US8589693B2 (en) | Method for two step digital signature | |
| KR20070104939A (en) | Small public-key based digital signature for authentication | |
| EP2945347B1 (en) | Methods and devices for securing keys when key-management processes are subverted by an adversary | |
| Yoon et al. | A new authentication scheme for session initiation protocol | |
| Shakiba | Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks | |
| Giri et al. | An improved remote user authentication scheme with smart cards using bilinear pairings | |
| Azrour et al. | Cryptanalysis of Farash et al.'s SIP authentication protocol | |
| Braeken | PUF‐Based Authentication and Key Exchange for Internet of Things | |
| Chou et al. | Improvement of Manik et al.¡¦ s remote user authentication scheme | |
| Elkamchouchi et al. | An efficient proxy signcryption scheme based on the discrete logarithm problem | |
| Kwon | Virtual software tokens-a practical way to secure PKI roaming | |
| Chen et al. | Blockchain as a CA: A provably secure signcryption scheme leveraging blockchains | |
| Kwon | Robust Software Tokens—Yet another method for securing user’s digital identity | |
| Modares et al. | Make a Secure Connection Using Elliptic Curve Digital Signature | |
| Vesterås | Analysis of key agreement protocols | |
| Yeun | Design, analysis and applications of cryptographic techniques | |
| Salem et al. | AN IMPROVED AND EFFICIENT RSA-BASED AUTHENTICATION SCHEME FOR HEALTHCARE SYSTEMS. | |
| Vo et al. | Security enhancement of a remote user authentication scheme using bilinear pairings and ECC | |
| Abdelsatir et al. | On the Implementation of a Secure Email System with ID-based Encryption | |
| Kwon | Robust Software Tokens-Yet Another Method for Securing User’s Digital Identity (Extended and Revised: Ver. 0.9) | |
| Kwon | On the difficulty of protecting private keys in software |