[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Wang et al., 2008 - Google Patents

Keep passwords away from memory: Password caching and verification using tpm

Wang et al., 2008

View PDF
Document ID
5690619574399284206
Author
Wang H
Guo Y
Zhao X
Chen X
Publication year
Publication venue
22nd International Conference on Advanced Information Networking and Applications (aina 2008)

External Links

Snippet

TPM is able to provide strong secure storage for sensitive data such as passwords. Although several commercial password managers have used TPM to cache passwords, they are not capable of protecting passwords during verification. This paper proposes a new TPM-based …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
CN101350723B (en) USB Key equipment and method for implementing verification thereof
Sun et al. oPass: A user authentication protocol resistant to password stealing and password reuse attacks
US8132020B2 (en) System and method for user authentication with exposed and hidden keys
CA2838763C (en) Credential authentication methods and systems
US8037295B2 (en) Hardware-bonded credential manager method and system
US8909932B2 (en) Method and apparatus for security over multiple interfaces
CN109361668A (en) A kind of data trusted transmission method
US8953805B2 (en) Authentication information generating system, authentication information generating method, client apparatus, and authentication information generating program for implementing the method
Chen et al. Attack, solution and verification for shared authorisation data in TCG TPM
EP1081891A2 (en) Autokey initialization of cryptographic devices
US20060053288A1 (en) Interface method and device for the on-line exchange of content data in a secure manner
Murtaza et al. A portable hardware security module and cryptographic key generator
KR20070059891A (en) Application authentication security system and method thereof
JP3872616B2 (en) User authentication method on the Internet using a shared key encryption IC card
Susukailo et al. Access control system based on encryption in QR-Code technology
George User Authentication with Smart Cards in Trusted Computing Architecture.
Wagner et al. Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices.
Wang et al. Keep passwords away from memory: Password caching and verification using tpm
Lu et al. Communication security between a computer and a hardware token
Xia et al. Design of secure FTP system
Fourar-Laidi A smart card based framework for securing e-business transactions in distributed systems
Milburn et al. FassKey: A secure and convenient authentication system
Stumpf et al. Towards secure e-commerce based on virtualization and attestation techniques
Wala'a et al. Modified USB Security Token for User Authentication.
Pavani A Novel Authentication Mechanism to Prevent Unauthorized Service Access for Mobile Device in Distributed Network