Citation: | HUANG Jian, MIAO Fuyou, LÜ Jianlin, XIONG Yan. Mobile Phone Based Portable Key Management[J]. Chinese Journal of Electronics, 2013, 22(1): 124-130. |
K. Small, Data breaches caused by human error, hardware theft. http://www.itnews.com.au/News/87188, data-breachescausedby-human-error-hardware-theft-survey.aspx.
|
SecureStar, DriveCrypt: Disk encryption and data encryptionsoftware. http://www.securstar.com/products drivecrypt.php.
|
XinHua News Agency, China has 929.84 Million Mobile PhoneUsers, http://news.xinhuanet.com/english2010/china/2011-08/29/c 131081438.htm, 2011.
|
M.D. Corner and B.D. Noble, “Zero-interaction authentication”,in Proceedings of ACM Conference on Mobile Computingand Networking (MobiCom), Atlanta, USA, pp.1-11, 2002.
|
Ahren Studer, Adrian Perrig, Mobile User Location-specificEncryption (MULE): Using Your Office as Your Password,WiSec’10, Hoboken, New Jersey, USA, pp.151-162, 2010.
|
P. MacKenzie et al., “Networked cryptographic devices resilientto capture”, in Proceedings of IEEE Symposium on Security andPrivacy, Oakland, California, USA, pp.15-25, 2001.
|
IEEE Std 802.15.1-2002, Specifications for Wireless PersonalArea Networks (WPANs), 2010.
|
Michael Burrows, Martin Abadi, Roger Needham, “Authentication:A practical study in belief and action”, Proceedings ofthe 2nd Conference in Theoretical Aspects of Reasoning aboutKnowledge, San Francisco, CA, USA, pp.325-342, 1988.
|
Michael Burrows, Martin Abadi, Roger Needham, “A logicof authentication”, ACM Transactions in Computer Systems,Vol.8, No.1, pp.18-36, 1990.
|
RC4, http://en.wikipedia.org/wiki/RC4, 1987.
|
J. Daemen, V. Rijmen, The Design of Rijndael: AES-the AdvancedEncryption Standard, Springer, Heidelberg, pp.1-239,2002.
|
FIPS 46-3, Data Encryption Standard (DES), 1999.
|