Filters








5,335 Hits in 5.4 sec

Hardware Level Security in e-Wallet: Today's Need

Jatinder Singh
2017 Indian Journal of Science and Technology  
Through hardware level security the e-Wallet would be more secure and can be used freely without worry of fraud.  ...  To implement hardware level security measure, application developers have to code applications from scratch. Developers need to find a way so that recoding of application can be avoided.  ...  On server end, the server decrypts this information and detect the password and biometric from hardware tokens and compare it with the stored in its memory. 4.  ... 
doi:10.17485/ijst/2017/v10i11/111087 fatcat:rvzrydduargolbcr6ofckdp6jq

Development of Single Sign-On System with Hardware Token and Key Management Server

Daiki NOBAYASHI, Yutaka NAKAMURA, Takeshi IKENAGA, Yoshiaki HORI
2009 IEICE transactions on information and systems  
Therefore, in this paper, we propose a new SSO system with a hardware token and a key management server to improve the safety, ubiquity, and adaptability of services.  ...  We also explore the ability to add functions to this system; for example, we add high trust connection functionality for a Web server and show its effectiveness. key words: single sign-on, hardware token  ...  Acknowledgment This research was partially supported by the Ministry of Education, Science, Sports and Culture, Grant-in-Aid for Scientific Research on Priority Areas, New IT Infrastructure for the Information-explosion  ... 
doi:10.1587/transinf.e92.d.826 fatcat:ewwvxq3eafehjkrxo7eurt6kom

Development of Single Sign-On System with Hardware Token and Key Management Server

Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga, Yoshiaki Hori
2007 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007)  
Therefore, in this paper, we propose a new SSO system with a hardware token and a key management server to improve the safety, ubiquity, and adaptability of services.  ...  We also explore the ability to add functions to this system; for example, we add high trust connection functionality for a Web server and show its effectiveness. key words: single sign-on, hardware token  ...  Acknowledgment This research was partially supported by the Ministry of Education, Science, Sports and Culture, Grant-in-Aid for Scientific Research on Priority Areas, New IT Infrastructure for the Information-explosion  ... 
doi:10.1109/icsnc.2007.31 dblp:conf/icsnc/NobayashiNIH07 fatcat:hrlxniwxfbaddbqxcj6q22oa5y

POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS

Petro Klimushin, Tetiana Solianyk, Tetiana Kolisnyk, Oleksandr Mozhaiv
2021 Advanced Information Systems  
performed as a result of hashing a random number with a secret key, that is, the exchange of the session key is performed in an encrypted secure form.  ...  with an intermediate key, which leads to the complication of the scheme due to double hashing, but significantly increases the level of information security of IoT nodes.  ...  Since the firmware of the standard microcontroller can be hacked, in such cases it is recommended to store both the password in a secure hardware environment and to compare the value of the entered password  ... 
doi:10.20998/2522-9052.2021.3.14 fatcat:yrjhfrfu2femtiw4eyocroawxe

A Practical Password Management Scheme based on Computer Hardware Information and IC card

Jie Xu, Zhongtian Jia, Bo Zhang, Minyao Ma
2018 DEStech Transactions on Computer Science and Engineering  
The accounts and passwords of the third-party systems are stored in a secure repository of a computer.  ...  The management of these accounts and their passwords has become a public problem needed to be solved. Recently, there have been a lot of works trying to answer this question in the literature.  ...  To obtain adequate security, both the client side and server side were encrypted.  ... 
doi:10.12783/dtcse/csae2017/17530 fatcat:dq5dktmwkzbjhmudh4i4ogprxa

Physically restricted authentication with trusted hardware

Michael S. Kirkpatrick, Elisa Bertino
2009 Proceedings of the 2009 ACM workshop on Scalable trusted computing - STC '09  
Second, they are vulnerable to insider attacks in which a trusted administrator acts maliciously. In this work, we describe a novel approach using secure hardware that solves these problems.  ...  We define an administrative model and detail the requirements for an authentication protocol to be compatible with our methodology.  ...  In a typical environment, a user must enter a valid username and password to gain access to the system.  ... 
doi:10.1145/1655108.1655118 dblp:conf/ccs/KirkpatrickB09 fatcat:3q5e2q5ck5bapf2csdvjfetxjq

Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware [chapter]

Debra L. Cook, Ricardo Baratto, Angelos D. Keromytis
2005 Lecture Notes in Computer Science  
Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it.  ...  This allows us to leverage existing capabilities as opposed to designing a new component from scratch. We discuss the applicability of GPU-based decryption in the two scenarios.  ...  We use a remote-keying protocol to securely convey the decryption key(s) to the GPU, without exposing them to the underlying system.  ... 
doi:10.1007/11602897_31 fatcat:ky56oqtjbjdebk4pgkdgub7czm

An embedded DSP hardware encryption module for secure e-commerce transactions

J. Hu, X. D. Hoang, I. Khalil
2010 Security and Communication Networks  
The goal is to seamlessly integrate the embedded DSP hardware encryption module, which combines computational power and flexibility in programming, with a widely available web browser that provides the  ...  The integrated system can store and process security sensitive data inside the plug-in hardware.  ...  ACKNOWLEDGEMENTS The authors acknowledge the financial support from the ARC (Australia Research Council) Discovery Grant with Project ID DP0985838, and National Foundation for Science and Technology Development  ... 
doi:10.1002/sec.221 fatcat:hfseugu7vvf3ll3ve7dyaoka64

Secure Audit Logging with Tamper-Resistant Hardware [chapter]

Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel
2003 Security and Privacy in the Age of Uncertainty  
Secure audit logging records the user's actions on content and enables detection of some forms of tampering with the logs.  ...  We provide a performance assessment of our implementation to show under which circumstances the protocol is practical to use.  ...  A smart card (and Java card, which is an instance of a smart card) is a general hardware token that is used to store holders' sensitive information, such as bank account data, PIN numbers, passwords, private  ... 
doi:10.1007/978-0-387-35691-4_7 fatcat:bpwns3ip3vajncrzirz6l766r4

Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices

Apostolos P. Fournaris, Charis Dimopoulos, Konstantinos Lampropoulos, Odysseas Koufopavlou
2020 Sensors  
Thus, we propose a Hardware Security Token (HST) that when connected to a CI host, it acts as a secure anchor for security agent information collection.  ...  In this paper, we describe existing approaches on security monitoring in critical infrastructures and focus on how to collect security sensor–agent information in a secure and trusted way.  ...  The biggest challenge in such legacy devices is how to install security monitoring sensors on them and how to predict/model their behavior correctly in order to detect possible anomalies.  ... 
doi:10.3390/s20113092 pmid:32486125 fatcat:r4pvpcxqejh2rajnea3pj6mliu

Base Platform Security Hardware Building Blocks [chapter]

Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
2019 Demystifying Internet of Things Security  
In the following sections, we will learn how the hardware-enhanced security strengthens Anti-Malware Defenses via the OS Guard (SMAP, SMEP), performing encryption/decryption, sign/verify, and random number  ...  Instead, Intel ® TXT transitions the CPU to a secure operational mode using an IA instruction, then proceeds to boot a hypervisor or OS without invoking BIOS.  ...  Examples include remote car control in the jeep scenario and Ukraine power grid. • Mitigation: Intel ® Security Essentials, Intel Stratix ® FPGA, protected boot, and attested software measurements can  ... 
doi:10.1007/978-1-4842-2896-8_3 fatcat:3fwox565h5f6zaf6duxknlk7bq

A software-hardware architecture for self-protecting data

Yu-Yuan Chen, Pramod A. Jamkhedkar, Ruby B. Lee
2012 Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12  
Our architecture provides dynamic instantiations of secure data compartments (SDCs), with hardware monitoring of the information flows from the compartment using hardware policy tags associated with the  ...  DataSafe architecture is designed to prevent illegitimate secondary dissemination of protected plaintext data by authorized recipients, to track and protect data derived from sensitive data, and to provide  ...  We thank the anonymous reviewers and our shepherd, Radu Sion, for their comments which have helped to improve this paper. We also thank Si Chen for helping with the software performance measurements.  ... 
doi:10.1145/2382196.2382201 dblp:conf/ccs/ChenJL12 fatcat:nqrf6k2wdnf5lcojjxjtgon4ai

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

Joseph I. Choi, Kevin R. B. Butler
2019 Security and Communication Networks  
This paper revisits the history of improvements to SMC over the years and considers the possibility of coupling trusted hardware with SMC.  ...  When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits.  ...  Acknowledgments Special thanks are due to Patrick Traynor and Thomas Shrimpton for their interest in and constructive criticisms of this work.  ... 
doi:10.1155/2019/1368905 fatcat:izynm6msrvehfa3ghkw7tykk34

Hardware Security in IoT Devices with Emphasis on Hardware Trojans

Simranjeet Sidhu, Bassam J. Mohd, Thaier Hayajneh
2019 Journal of Sensor and Actuator Networks  
A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware.  ...  However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software, network, and cloud security.  ...  B.J.M. was responsible for guiding the hardware security part, helped in the security analysis and writing the paper.  ... 
doi:10.3390/jsan8030042 fatcat:zuzw6sf2hzgdfiz65p2joz2g6a

RAM Encryption Mechanism without Hardware Support

Tsutomu Matsumoto, Ryo Miyachi, Junichi Sakamoto, Manami Suzuki, Dai Watanabe, Naoki Yoshida
2020 Journal of Information Processing  
In this paper, we discuss the feasibility of software based RAM encryption and clarify that it is possible to be secure against so-called semi-honest adversaries under some additional and reasonable constraints  ...  The RAM encryption encrypts the data on memory to prevent data leakage from an adversary to eavesdrop the memory space of the target program.  ...  Contribution of This Paper This paper deals with the protection of data on memory allocated to processes by a RAM encryption function and considers how to realize it without hardware support.  ... 
doi:10.2197/ipsjjip.28.473 fatcat:w3acblejqbfkrplvd7upbvzqvm
« Previous Showing results 1 — 15 out of 5,335 results