全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于可信计算的口令管理方案

DOI: 10.13190/jbupt.200805.93.chenag, PP. 93-97

Keywords: 可信计算,口令鉴别,口令管理,网络钓鱼

Full-Text   Cite this paper   Add to My Lib

Abstract:

针对现有口令管理方案抗攻击能力和易用性方面的不足,提出了基于可信计算的口令管理方案.该方案借助可信平台模块的密钥管理、安全存储和授权访问控制等关键技术实现了口令管理中敏感数据的安全保护,增强了口令计算过程的安全性.通过与现有方案的对比,分析了该方案的安全性和易用性.分析结果表明,本文的方案提高了口令的强度和易用性,并且能够抵抗网络钓鱼攻击.

References

[1]  Emigh A. Online identity theft: phishing technology, chokepoints and countermeasures[Z]. : Radix Labs, 2005.
[2]  Yan J, Blackwell A, Anderson R, et al. The memorability and security of passwords-some empirical results[Z]. : University of Cambridge Computer Laboratory, 2000.
[3]  Hamilton S S, Carlisle M C, Hamilton J A. A global look at authentication//IWA'07. New York: IEEE SMC, 2007: 1-8.
[4]  Gajek S, Sadeghi A R, Stuble C, et al. Compartmented security for browsers-or how to thwat a phisher with trusted computing//Proceedings of the 2nd International Conference on Availability, Reliability and Security. Washington D C: IEEE Computer Society, 2007: 120-127.
[5]  Me G, Pirro D, Sarrecchia R. A mobile based approach to strong authentication on web//Proceedings of the International Multi-Conference on Computing in the Global Information Technology. Washington D C: IEEE Computer Society, 2006: 67-67.
[6]  Schneier B. Password safe. .
[7]  Gabber E, Gibbons P B, Matias Y, et al. How to make personalized web browsing simple, secure and anonymous//Proceedings of Financial Cryptography'97. Anguilla: Springer-Verlag, 1997: 17-31.
[8]  Ross B, Jackson C, Miyake N, et al. Stronger password authentication using browser extensions//Proceedings of the 14th USENIX Security Symposium. California: USENIX Association Berkeley, 2005: 17-32.
[9]  Halderman J A, Waters B, Felten E W. A convenient method for securely managing passwords//Proceedings of the 14th International Conference on World Wide Web. Chiba: ACM Press, 2005: 471-479.
[10]  Yee K P, Sitaker K. Passpet: convenient password management and phishing protection//Proceedings of the Second Symposium on Usable Privacy and Security. New York: ACM, 2006: 32-43.
[11]  Trusted Computing Group. TCG specification architecture overview specification. .
[12]  Trusted Computing Group. TCG software stack (TSS) specification. .
[13]  Trusted Computing Group. TPM main part 1 design principles specification. .

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133