The Use of Two Authentication Factors to Enhance the Security of Mass Storage Devices.
Mohamed Hamdy EldefrawyMuhammad Khurram KhanHassan M. ElkamchouchiPublished in: ITNG (2014)
Keyphrases
- storage devices
- data integrity
- security mechanisms
- security requirements
- authentication mechanism
- user authentication
- data encryption
- authentication protocol
- security analysis
- integrity verification
- factor authentication
- data storage
- storage area network
- file system
- information security
- virtual private network
- security issues
- access control
- storage systems
- special purpose
- key management
- flash memory
- disk drives
- distributed databases
- smart card
- database design
- database systems