메뉴 건너뛰기




Volumn 60, Issue 1, 2014, Pages 30-37

Enhanced three-factor security protocol for consumer USB mass storage devices

Author keywords

Authentication; Consumer Storage; Mass Storage Device; USB

Indexed keywords

AUTHENTICATION; STANDARDS; VIRTUAL STORAGE;

EID: 84898048082     PISSN: 00983063     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCE.2014.6780922     Document Type: Article
Times cited : (189)

References (21)
  • 2
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • Oct.
    • C. Wu, W. Lee, and W. J. Tsaur, "A secure authentication scheme with anonymity for wireless communications," IEEE Communications Letters, vol. 12, no. 10, pp. 722-723, Oct. 2008.
    • (2008) IEEE Communications Letters , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.1    Lee, W.2    Tsaur, W.J.3
  • 3
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • Feb.
    • M. S. Hwang, and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron., vol. 46, no. 1, pp. 28-30, Feb. 2000.
    • (2000) IEEE Trans. Consumer Electron. , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 4
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    • Feb.
    • W. C. Ku, and S. M. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron, vol. 50, no. 1, pp. 204-207, Feb. 2004.
    • (2004) IEEE Trans. Consumer Electron , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.C.1    Chen, S.M.2
  • 5
    • 4043152192 scopus 로고    scopus 로고
    • Further improvement of an efficient password based remote user authentication scheme using smart cards
    • May
    • E. Yoon, E. Ryu, and K. Yoo, "Further improvement of an efficient password based remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron, vol. 50, no. 2, pp. 612-614, May 2004.
    • (2004) IEEE Trans. Consumer Electron , vol.50 , Issue.2 , pp. 612-614
    • Yoon, E.1    Ryu, E.2    Yoo, K.3
  • 6
    • 59649086399 scopus 로고    scopus 로고
    • Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
    • Elsevier Mar.
    • H. C. Hsiang, and W. K. Shih "Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards," Computer Communications, Elsevier, vol. 32, no. 4, pp. 649-652, Mar. 2009.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 649-652
    • Hsiang, H.C.1    Shih, W.K.2
  • 7
    • 84858112506 scopus 로고    scopus 로고
    • Security flaws in three password-based remote user authentication schemes with smart cards
    • Jan.
    • K.-A. Shim, "Security flaws in three password-based remote user authentication schemes with smart cards," Cryptologia, Taylor and Francis, vol. 36, no. 1, pp. 62-69, Jan. 2012.
    • (2012) Cryptologia Taylor and Francis , vol.36 , Issue.1 , pp. 62-69
    • Shim, K.-A.1
  • 8
    • 58149383161 scopus 로고    scopus 로고
    • Multimodal biometric authentication using teeth image and voice in mobile environment
    • Nov.
    • D.-J. Kim, and K.-S. Hong, "Multimodal biometric authentication using teeth image and voice in mobile environment," IEEE Trans. Consumer Electron., vol. 54, no. 4, pp. 1790-1797, Nov. 2008.
    • (2008) IEEE Trans. Consumer Electron. , vol.54 , Issue.4 , pp. 1790-1797
    • Kim, D.-J.1    Hong, K.-S.2
  • 9
    • 78651406039 scopus 로고    scopus 로고
    • Person authentication using face, teeth and voice modalities for mobile device security
    • Nov.
    • D.-J. Kim, K.-W. Chung, and K.-S. Hong, "Person authentication using face, teeth and voice modalities for mobile device security", IEEE Trans. Consumer Electron, vol. 56, no. 4, pp. 2678-2685, Nov. 2010.
    • (2010) IEEE Trans. Consumer Electron , vol.56 , Issue.4 , pp. 2678-2685
    • Kim, D.-J.1    Chung, K.-W.2    Hong, K.-S.3
  • 10
    • 84867306250 scopus 로고    scopus 로고
    • Illumination-robust face recognition system based on differential components
    • Aug.
    • S.-H. Lee, D.-J. Kim, and J.-H. Cho, "Illumination-robust face recognition system based on differential components," IEEE Trans. Consumer Electron., vol. 58, no. 3, pp. 963-970, Aug. 2012.
    • (2012) IEEE Trans. Consumer Electron. , vol.58 , Issue.3 , pp. 963-970
    • Lee, S.-H.1    Kim, D.-J.2    Cho, J.-H.3
  • 11
    • 78651401376 scopus 로고    scopus 로고
    • A secure control protocol for USB mass storage devices
    • Nov.
    • F.-Y. Yang, T.-D. Wu, and S.-H. Chiu, "A secure control protocol for USB mass storage devices," IEEE Trans. Consumer Electron., vol. 56, no. 4, pp. 2339-2343, Nov. 2010.
    • (2010) IEEE Trans. Consumer Electron. , vol.56 , Issue.4 , pp. 2339-2343
    • Yang, F.-Y.1    Wu, T.-D.2    Chiu, S.-H.3
  • 12
    • 12344258539 scopus 로고
    • Efficient identification and signatures for smart cards
    • Springer
    • C. Schnorr, "Efficient identification and signatures for smart cards," Journal of Cryptology, Springer, vol. 4, no. 3, pp. 161-174, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.1
  • 13
    • 84872165930 scopus 로고    scopus 로고
    • A secure access authentication scheme for removable storage media
    • Binary Information Press Nov.
    • B. Chen, C. Qin, and L. Yu, "A Secure Access Authentication Scheme for Removable Storage Media," Journal of Information & Computational Science, Binary Information Press, vol. 9, no. 15, pp. 4353-4363, Nov. 2012.
    • (2012) Journal of Information & Computational Science , vol.9 , Issue.15 , pp. 4353-4363
    • Chen, B.1    Qin, C.2    Yu, L.3
  • 14
    • 84880677476 scopus 로고    scopus 로고
    • Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices
    • Jan.
    • C. Lee, C. Chen, and P. Wu, "Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices," IET Computers & Digital Techniques, vol. 7, no. 1, pp. 48-55, Jan. 2013.
    • (2013) IET Computers & Digital Techniques , vol.7 , Issue.1 , pp. 48-55
    • Lee, C.1    Chen, C.2    Wu, P.3
  • 15
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometrics-based remote user authentication scheme using smart cards
    • Elsevier Jan.
    • C.-T. Li, and M.-S. Hwang, "An efficient biometrics-based remote user authentication scheme using smart cards," Journal of Network and Computer Applications, Elsevier, vol. 33, no. 1, pp. 1-5, Jan. 2010.
    • (2010) Journal of Network and Computer Applications , vol.33 , Issue.1 , pp. 1-5
    • Li, C.-T.1    Hwang, M.-S.2
  • 17
    • 81855227196 scopus 로고    scopus 로고
    • Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
    • Sept.
    • A. Das, "Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards", IET Information Security, vol. 5, no. 3, pp. 145-151, Sept. 2011.
    • (2011) IET Information Security , vol.5 , Issue.3 , pp. 145-151
    • Das, A.1
  • 18
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Proc. 2004 Int. Conf. Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," in Proc. 2004 Int. Conf. Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, in Lecture Notes in Computer Science, pp. 523-540, 2004.
    • (2004) Lecture Notes in Computer Science , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 20
    • 84874108902 scopus 로고    scopus 로고
    • HOTA: Handover optimized ticket-based authentication in network-based mobility management
    • Elsevier May
    • J.-H. Lee and J.-M. Bonnin, "HOTA: Handover Optimized Ticket-based Authentication in Network-based Mobility Management," Information Sciences, Elsevier, vol. 230, pp. 64-77, May 2013.
    • (2013) Information Sciences , vol.230 , pp. 64-77
    • Lee, J.-H.1    Bonnin, J.-M.2
  • 21
    • 33747419291 scopus 로고    scopus 로고
    • Applied cryptography protocols algorithms
    • Wiley
    • B. Schneier, Applied cryptography protocols algorithms, 2nd ed., Wiley, 1996.
    • (1996) 2nd Ed.
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.