A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hardware Level Security in e-Wallet: Today's Need
2017
Indian Journal of Science and Technology
Through hardware level security the e-Wallet would be more secure and can be used freely without worry of fraud. ...
To implement hardware level security measure, application developers have to code applications from scratch. Developers need to find a way so that recoding of application can be avoided. ...
On server end, the server decrypts this information and detect the password and biometric from hardware tokens and compare it with the stored in its memory. 4. ...
doi:10.17485/ijst/2017/v10i11/111087
fatcat:rvzrydduargolbcr6ofckdp6jq
Development of Single Sign-On System with Hardware Token and Key Management Server
2009
IEICE transactions on information and systems
Therefore, in this paper, we propose a new SSO system with a hardware token and a key management server to improve the safety, ubiquity, and adaptability of services. ...
We also explore the ability to add functions to this system; for example, we add high trust connection functionality for a Web server and show its effectiveness. key words: single sign-on, hardware token ...
Acknowledgment This research was partially supported by the Ministry of Education, Science, Sports and Culture, Grant-in-Aid for Scientific Research on Priority Areas, New IT Infrastructure for the Information-explosion ...
doi:10.1587/transinf.e92.d.826
fatcat:ewwvxq3eafehjkrxo7eurt6kom
Development of Single Sign-On System with Hardware Token and Key Management Server
2007
2007 Second International Conference on Systems and Networks Communications (ICSNC 2007)
Therefore, in this paper, we propose a new SSO system with a hardware token and a key management server to improve the safety, ubiquity, and adaptability of services. ...
We also explore the ability to add functions to this system; for example, we add high trust connection functionality for a Web server and show its effectiveness. key words: single sign-on, hardware token ...
Acknowledgment This research was partially supported by the Ministry of Education, Science, Sports and Culture, Grant-in-Aid for Scientific Research on Priority Areas, New IT Infrastructure for the Information-explosion ...
doi:10.1109/icsnc.2007.31
dblp:conf/icsnc/NobayashiNIH07
fatcat:hrlxniwxfbaddbqxcj6q22oa5y
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
2021
Advanced Information Systems
performed as a result of hashing a random number with a secret key, that is, the exchange of the session key is performed in an encrypted secure form. ...
with an intermediate key, which leads to the complication of the scheme due to double hashing, but significantly increases the level of information security of IoT nodes. ...
Since the firmware of the standard microcontroller can be hacked, in such cases it is recommended to store both the password in a secure hardware environment and to compare the value of the entered password ...
doi:10.20998/2522-9052.2021.3.14
fatcat:yrjhfrfu2femtiw4eyocroawxe
A Practical Password Management Scheme based on Computer Hardware Information and IC card
2018
DEStech Transactions on Computer Science and Engineering
The accounts and passwords of the third-party systems are stored in a secure repository of a computer. ...
The management of these accounts and their passwords has become a public problem needed to be solved. Recently, there have been a lot of works trying to answer this question in the literature. ...
To obtain adequate security, both the client side and server side were encrypted. ...
doi:10.12783/dtcse/csae2017/17530
fatcat:dq5dktmwkzbjhmudh4i4ogprxa
Physically restricted authentication with trusted hardware
2009
Proceedings of the 2009 ACM workshop on Scalable trusted computing - STC '09
Second, they are vulnerable to insider attacks in which a trusted administrator acts maliciously. In this work, we describe a novel approach using secure hardware that solves these problems. ...
We define an administrative model and detail the requirements for an authentication protocol to be compatible with our methodology. ...
In a typical environment, a user must enter a valid username and password to gain access to the system. ...
doi:10.1145/1655108.1655118
dblp:conf/ccs/KirkpatrickB09
fatcat:3q5e2q5ck5bapf2csdvjfetxjq
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
[chapter]
2005
Lecture Notes in Computer Science
Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. ...
This allows us to leverage existing capabilities as opposed to designing a new component from scratch. We discuss the applicability of GPU-based decryption in the two scenarios. ...
We use a remote-keying protocol to securely convey the decryption key(s) to the GPU, without exposing them to the underlying system. ...
doi:10.1007/11602897_31
fatcat:ky56oqtjbjdebk4pgkdgub7czm
An embedded DSP hardware encryption module for secure e-commerce transactions
2010
Security and Communication Networks
The goal is to seamlessly integrate the embedded DSP hardware encryption module, which combines computational power and flexibility in programming, with a widely available web browser that provides the ...
The integrated system can store and process security sensitive data inside the plug-in hardware. ...
ACKNOWLEDGEMENTS The authors acknowledge the financial support from the ARC (Australia Research Council) Discovery Grant with Project ID DP0985838, and National Foundation for Science and Technology Development ...
doi:10.1002/sec.221
fatcat:hfseugu7vvf3ll3ve7dyaoka64
Secure Audit Logging with Tamper-Resistant Hardware
[chapter]
2003
Security and Privacy in the Age of Uncertainty
Secure audit logging records the user's actions on content and enables detection of some forms of tampering with the logs. ...
We provide a performance assessment of our implementation to show under which circumstances the protocol is practical to use. ...
A smart card (and Java card, which is an instance of a smart card) is a general hardware token that is used to store holders' sensitive information, such as bank account data, PIN numbers, passwords, private ...
doi:10.1007/978-0-387-35691-4_7
fatcat:bpwns3ip3vajncrzirz6l766r4
Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices
2020
Sensors
Thus, we propose a Hardware Security Token (HST) that when connected to a CI host, it acts as a secure anchor for security agent information collection. ...
In this paper, we describe existing approaches on security monitoring in critical infrastructures and focus on how to collect security sensor–agent information in a secure and trusted way. ...
The biggest challenge in such legacy devices is how to install security monitoring sensors on them and how to predict/model their behavior correctly in order to detect possible anomalies. ...
doi:10.3390/s20113092
pmid:32486125
fatcat:r4pvpcxqejh2rajnea3pj6mliu
Base Platform Security Hardware Building Blocks
[chapter]
2019
Demystifying Internet of Things Security
In the following sections, we will learn how the hardware-enhanced security strengthens Anti-Malware Defenses via the OS Guard (SMAP, SMEP), performing encryption/decryption, sign/verify, and random number ...
Instead, Intel ® TXT transitions the CPU to a secure operational mode using an IA instruction, then proceeds to boot a hypervisor or OS without invoking BIOS. ...
Examples include remote car control in the jeep scenario and Ukraine power grid. • Mitigation: Intel ® Security Essentials, Intel Stratix ® FPGA, protected boot, and attested software measurements can ...
doi:10.1007/978-1-4842-2896-8_3
fatcat:3fwox565h5f6zaf6duxknlk7bq
A software-hardware architecture for self-protecting data
2012
Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12
Our architecture provides dynamic instantiations of secure data compartments (SDCs), with hardware monitoring of the information flows from the compartment using hardware policy tags associated with the ...
DataSafe architecture is designed to prevent illegitimate secondary dissemination of protected plaintext data by authorized recipients, to track and protect data derived from sensitive data, and to provide ...
We thank the anonymous reviewers and our shepherd, Radu Sion, for their comments which have helped to improve this paper. We also thank Si Chen for helping with the software performance measurements. ...
doi:10.1145/2382196.2382201
dblp:conf/ccs/ChenJL12
fatcat:nqrf6k2wdnf5lcojjxjtgon4ai
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities
2019
Security and Communication Networks
This paper revisits the history of improvements to SMC over the years and considers the possibility of coupling trusted hardware with SMC. ...
When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits. ...
Acknowledgments Special thanks are due to Patrick Traynor and Thomas Shrimpton for their interest in and constructive criticisms of this work. ...
doi:10.1155/2019/1368905
fatcat:izynm6msrvehfa3ghkw7tykk34
Hardware Security in IoT Devices with Emphasis on Hardware Trojans
2019
Journal of Sensor and Actuator Networks
A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware. ...
However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software, network, and cloud security. ...
B.J.M. was responsible for guiding the hardware security part, helped in the security analysis and writing the paper. ...
doi:10.3390/jsan8030042
fatcat:zuzw6sf2hzgdfiz65p2joz2g6a
RAM Encryption Mechanism without Hardware Support
2020
Journal of Information Processing
In this paper, we discuss the feasibility of software based RAM encryption and clarify that it is possible to be secure against so-called semi-honest adversaries under some additional and reasonable constraints ...
The RAM encryption encrypts the data on memory to prevent data leakage from an adversary to eavesdrop the memory space of the target program. ...
Contribution of This Paper This paper deals with the protection of data on memory allocated to processes by a RAM encryption function and considers how to realize it without hardware support. ...
doi:10.2197/ipsjjip.28.473
fatcat:w3acblejqbfkrplvd7upbvzqvm
« Previous
Showing results 1 — 15 out of 5,324 results