The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, removable (external USB) mass storage devices are finding widespread utilization for transferring and backing up data. They even can be used as bootable devices. They have brought us great convenience, yet, simultaneously, they are very vulnerable to the extraction of private and confidential data from computer systems. Some access authentication schemes have been proposed for removable...
The external storage using a universal serial bus (USB) communication become the most popular use for storing digital data. Application such as evidence acquisition in digital forensic area needs external storage devices that are portable, high speed of data transfer, and easy to use for collecting digital data from suspect computers. Apart from these advantages of USB storage devices, they do not...
At present, most enterprises have high demand on system security in order to protect confidential business information. According to the successful application of USB key and virtualization in secure field, combining virtual disk image (VDI) files encryption, this article proposes a general business protection system for enterprise (GEBPS). With GEBPS, enterprises can use different virtual machines...
Smart cards have been used in a wide variety of vertical markets delivering security services related to physical access control, user authentication and high value data transactions. However, their adoption in plug-n-play removable data storage markets is generally hindered by their dependence on external smart card reader hardware, their proprietary communication protocol that requires installation...
The secure authentication and transaction is one of the important parts in networking security. Because of the security flaws of some existing schemes, this paper proposes a secure authentication and transaction protocol based on digital certificates and dynamic password. The protocol not only can realize the mutual authentication of the client and server, but also can achieve secure authentication...
Trusted Computing Group (TCG) presented Trusted Computing Specifications, which ensured the security of the platform and applications by measuring and verifying the integrity of the components. The boot process is the base of the operating system, thus implementing trusted boot is of great significance. However, the trusted boot process may be blocked because of some corrupted components, which is...
Trusted Computing has become the research focus in information security field. Its idea is to embed a secure chip named TPM (Trusted Platform Module) in the computer's hardware, with which a trust chain can be set up to ensure the trust of computer. Since the resources of TPM are restricted, the interfaces and capabilities are cumbersome. In order to solve these problems, TCG gave a TSS (TCG Software...
The Universal Serial Bus (USB) has become the most popular interface standard for hardware connection, and there has been an explosion in the number of USB peripheral devices. External USB storage devices, in particular, are finding widespread application. Unfortunately, because USB affords high transmission speeds and is extremely convenient, many workplaces and businesses have prohibited the use...
Nowadays, in most of the unauthorized internet access monitoring systems, there is no satisfactory method on access control with USB storage device. The common way is to take off the USB port from the computer to prohibit the use of USB storage devices. This method directly leads to lose the convenience by using USB storage devices, and also no longer be able to use other equipment based on the USB...
As a kind of secure and efficient module, TPM is seldom integrated in the motherboard of PC at present, in the paper a USB flash disk-based model of mobile TPM with mass storage is presented. In this mobile TPM, a 32-bits embedded CPU with RISC is adopted, which is integrated kinds of encryption algorithms. The mutual authentication between mobile TPM and the host is proposed; in the other hand, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.