Wang et al., 2008 - Google Patents
Keep passwords away from memory: Password caching and verification using tpmWang et al., 2008
View PDF- Document ID
- 5690619574399284206
- Author
- Wang H
- Guo Y
- Zhao X
- Chen X
- Publication year
- Publication venue
- 22nd International Conference on Advanced Information Networking and Applications (aina 2008)
External Links
Snippet
TPM is able to provide strong secure storage for sensitive data such as passwords. Although several commercial password managers have used TPM to cache passwords, they are not capable of protecting passwords during verification. This paper proposes a new TPM-based …
- 238000000034 method 0 description 16
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101350723B (en) | USB Key equipment and method for implementing verification thereof | |
Sun et al. | oPass: A user authentication protocol resistant to password stealing and password reuse attacks | |
US8132020B2 (en) | System and method for user authentication with exposed and hidden keys | |
CA2838763C (en) | Credential authentication methods and systems | |
US8037295B2 (en) | Hardware-bonded credential manager method and system | |
US8909932B2 (en) | Method and apparatus for security over multiple interfaces | |
CN109361668A (en) | A kind of data trusted transmission method | |
US8953805B2 (en) | Authentication information generating system, authentication information generating method, client apparatus, and authentication information generating program for implementing the method | |
Chen et al. | Attack, solution and verification for shared authorisation data in TCG TPM | |
EP1081891A2 (en) | Autokey initialization of cryptographic devices | |
US20060053288A1 (en) | Interface method and device for the on-line exchange of content data in a secure manner | |
Murtaza et al. | A portable hardware security module and cryptographic key generator | |
KR20070059891A (en) | Application authentication security system and method thereof | |
JP3872616B2 (en) | User authentication method on the Internet using a shared key encryption IC card | |
Susukailo et al. | Access control system based on encryption in QR-Code technology | |
George | User Authentication with Smart Cards in Trusted Computing Architecture. | |
Wagner et al. | Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices. | |
Wang et al. | Keep passwords away from memory: Password caching and verification using tpm | |
Lu et al. | Communication security between a computer and a hardware token | |
Xia et al. | Design of secure FTP system | |
Fourar-Laidi | A smart card based framework for securing e-business transactions in distributed systems | |
Milburn et al. | FassKey: A secure and convenient authentication system | |
Stumpf et al. | Towards secure e-commerce based on virtualization and attestation techniques | |
Wala'a et al. | Modified USB Security Token for User Authentication. | |
Pavani | A Novel Authentication Mechanism to Prevent Unauthorized Service Access for Mobile Device in Distributed Network |