Secure strategic mail application with hardware device

@article{Kumar2016SecureSM,
  title={Secure strategic mail application with hardware device},
  author={K. Thirumal Kumar and N. Hemanth Kumar and Ankarao Ittadi and M. Akila and K. Bhanushree},
  journal={2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)},
  year={2016},
  pages={887-892}
}
With the growth of technology most of the sensitive data transactions are happening over the internet, which has to be protected against unauthorized access. The design and development of a Secure Hardware Token (SHT), is explained in this paper, which will protect the sensitive data from most of the threats, As it generates the highly secure onetime passwords (Time based OTP) [2] ensuring that only legitimate users are authorized to access sensitive data/applications and the SHT will perform… CONTINUE READING
0 Extracted Citations
6 Extracted References
Similar Papers

Referenced Papers

Publications referenced by this paper.
Showing 1-6 of 6 references

Design of a time and location based One-Time Password authentication scheme

  • Wen-Bin Hsieh, Jenq-Shiou
  • 7th International Wireless Communications and…
  • 2011

" Two - factor authentication " . Siemens Insight Consulting Time - Based One - Time Password Algorithm "

  • Duncan De Borde
  • 2007

Method and apparatus for generating one - time password on hand - held mobile device

  • Christian Brock, Chaing Chen
  • 2006

" A Method for Obtaining Digital Signatures and Public - Key Cryptosystems "

  • Nicolas Courtois, Josef Pieprzyk, R. Rivest, A. Shamir, L. Adleman
  • Communications of the ACM
  • 1978

Similar Papers

Loading similar papers…