In the present work, an innovative mechanism to convert a USB drive into a key has been introduced. A unique key file is written on to the drive which acts as the authentication mechanism to access the user’s computer. This device can be used to lock or unlock the system by simply removing or attaching it. The current session is not hampered even though the system is secure and cannot be accessed without the specific USB drive. To further improve security, the key file contents are rewritten after a set time interval, to preserve the security even if the drive is lost. In absence of the USB drive, the user can gain access by entering the master password. A particular system might have more than one USB keys as well, and a key can be used to...
Physical security is considered an integral part of information systems security. The idea that smal...
Information theft or data leakage is a growing concern for companies as well as individual users. In...
The variables that help make a handwritten signature a unique human identifier also provide a unique...
In 2007-2009, over 5 million computers were stolen in the United States. About 21% of the victims us...
Universal Serial Bus (USB) devices are high transmission speed external devices. USB is the speedies...
Abstract—Among the various means of available resource protection including biometrics, password bas...
The secure USB flash drive was developed to improve the security of the conventional USB flash drive...
This paper proposes two fused novel technologies in safeguarding computer system from unauthorized u...
Universal Serial Bus (USB) external devices are high speed flash/external drives which can boast dat...
Abstract —The Universal Serial Bus (USB) has become the most popular interface standard for hardware...
Industrial Control Systems (ICS) are sensible targets for high profile attackers and advanced persis...
Computer Authentication is a critical component of most computer systems – especially those used in ...
This paper proposes a key agreement scheme after secure authentication to prevent the unauthorized a...
Security is a critical component of most computer systems – especially those used in E-commerce acti...
A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitou...
Physical security is considered an integral part of information systems security. The idea that smal...
Information theft or data leakage is a growing concern for companies as well as individual users. In...
The variables that help make a handwritten signature a unique human identifier also provide a unique...
In 2007-2009, over 5 million computers were stolen in the United States. About 21% of the victims us...
Universal Serial Bus (USB) devices are high transmission speed external devices. USB is the speedies...
Abstract—Among the various means of available resource protection including biometrics, password bas...
The secure USB flash drive was developed to improve the security of the conventional USB flash drive...
This paper proposes two fused novel technologies in safeguarding computer system from unauthorized u...
Universal Serial Bus (USB) external devices are high speed flash/external drives which can boast dat...
Abstract —The Universal Serial Bus (USB) has become the most popular interface standard for hardware...
Industrial Control Systems (ICS) are sensible targets for high profile attackers and advanced persis...
Computer Authentication is a critical component of most computer systems – especially those used in ...
This paper proposes a key agreement scheme after secure authentication to prevent the unauthorized a...
Security is a critical component of most computer systems – especially those used in E-commerce acti...
A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitou...
Physical security is considered an integral part of information systems security. The idea that smal...
Information theft or data leakage is a growing concern for companies as well as individual users. In...
The variables that help make a handwritten signature a unique human identifier also provide a unique...