Sensitive Data Protection Using Transient Authentication

Download Now
Provided by: International Journals of Advanced Information Science and Technology (IJAIST)
Topic: Security
Format: PDF
Wireless devices like laptops are prone to theft and loss due to their small size and the characteristics of their common usage environment, because laptops allow users to work while they are away from their desk. Unfortunately, this is also where the information in these devices is, most at risk. Existing schemes for securing data either do not protect information in the device after it is stolen or require bothersome re-authentication. The authors provide a secure scheme which protects the sensitive data of the user in these devices. They solve the problem existing systems with transient authentication, in which a small hardware token (Mobile Phone) continuously authentication framework to secure sensitive and confidential data on laptop.
Download Now

Find By Topic