A Design Secure QR-Login User Authentication Protocol and Assurance Methods for the Safety of Critical Data Using Smart Device 


Vol. 37,  No. 10, pp. 949-964, Oct.  2012


PDF
  Abstract

Our PC have been under constant threat of malicious codes and viruses today. As many new ways of cyber attacks are being developed, such as zero-day-attack, nobody’s PC is guaranteed to be safe from the attacks. In case where a user uses the existing verification protocol on a unsecured PC, the user’s verification information may well be threatened by sniffing or man-in-the-middle attack. Especially, deadly attacks like memory hacking would give hard time for users to even recognize any symptom of virus infection. Therefore, this paper designs secured QR-Login user verification protocol for smart devices that are ready to communicate with QR-Code and proposes a way to keep critical data safe when using the internet. This way, user would be able to safeguard his/her critical data even when under attack by unknown attacks and safely carry out extremely sensitive task, like financial trading, on the device.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

J. Lee, H. You, C. Cho, M. Jun, "A Design Secure QR-Login User Authentication Protocol and Assurance Methods for the Safety of Critical Data Using Smart Device," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 10, pp. 949-964, 2012. DOI: .

[ACM Style]

Jae-sik Lee, Han-na You, Chang-hyun Cho, and Moon-seog Jun. 2012. A Design Secure QR-Login User Authentication Protocol and Assurance Methods for the Safety of Critical Data Using Smart Device. The Journal of Korean Institute of Communications and Information Sciences, 37, 10, (2012), 949-964. DOI: .

[KICS Style]

Jae-sik Lee, Han-na You, Chang-hyun Cho, Moon-seog Jun, "A Design Secure QR-Login User Authentication Protocol and Assurance Methods for the Safety of Critical Data Using Smart Device," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 10, pp. 949-964, 10. 2012.