Secure strategic mail application with hardware device

  title={Secure strategic mail application with hardware device},
  author={K. Thirumal Kumar and N. Hemanth Kumar and Ankarao Ittadi and M. Akila and K. Bhanushree},
  journal={2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)},
With the growth of technology most of the sensitive data transactions are happening over the internet, which has to be protected against unauthorized access. The design and development of a Secure Hardware Token (SHT), is explained in this paper, which will protect the sensitive data from most of the threats, As it generates the highly secure onetime passwords (Time based OTP) [2] ensuring that only legitimate users are authorized to access sensitive data/applications and the SHT will perform… CONTINUE READING