{"id":"https://openalex.org/W2059212242","doi":"https://doi.org/10.1109/tce.2014.6780922","title":"Enhanced three-factor security protocol for consumer USB mass storage devices","display_name":"Enhanced three-factor security protocol for consumer USB mass storage devices","publication_year":2014,"publication_date":"2014-02-01","ids":{"openalex":"https://openalex.org/W2059212242","doi":"https://doi.org/10.1109/tce.2014.6780922","mag":"2059212242"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2014.6780922","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2014.6780922","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Mathematics and Statistics, Wuhan University, Wuhan, China","School of Mathematics, and Statistics, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"School of Mathematics, and Statistics, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100409306","display_name":"Neeraj Kumar","orcid":"https://orcid.org/0000-0002-3020-3947"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Neeraj Kumar","raw_affiliation_strings":["Department of Computer Science and Engineering, Thapar University, Patiala, India","Department of Computer Science & Engineering , Thapar University , Patiala , India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thapar University, Patiala, India","institution_ids":["https://openalex.org/I162030827"]},{"raw_affiliation_string":"Department of Computer Science & Engineering , Thapar University , Patiala , India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040263146","display_name":"Jong\u2010Hyouk Lee","orcid":"https://orcid.org/0000-0002-1753-1284"},"institutions":[{"id":"https://openalex.org/I157264075","display_name":"Sangmyung University","ror":"https://ror.org/01x4whx42","country_code":"KR","type":"education","lineage":["https://openalex.org/I157264075"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jong-Hyouk Lee","raw_affiliation_strings":["Department of Computer Software Engineering, Sangmyung University, Republic of Korea","Senior Member; Department of Computer Software Engineering, Sangmyung University, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Software Engineering, Sangmyung University, Republic of Korea","institution_ids":["https://openalex.org/I157264075"]},{"raw_affiliation_string":"Senior Member; Department of Computer Software Engineering, Sangmyung University, Republic of Korea","institution_ids":["https://openalex.org/I157264075"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002654622","display_name":"R. Simon Sherratt","orcid":"https://orcid.org/0000-0001-7899-4445"},"institutions":[{"id":"https://openalex.org/I71052956","display_name":"University of Reading","ror":"https://ror.org/05v62cm79","country_code":"GB","type":"education","lineage":["https://openalex.org/I71052956"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"R. Simon Sherratt","raw_affiliation_strings":["School of Systems Engineering, the University of Reading, UK","Fellow; School of Systems Engineering, the University of Reading, RG6 6AY, UK"],"affiliations":[{"raw_affiliation_string":"School of Systems Engineering, the University of Reading, UK","institution_ids":["https://openalex.org/I71052956"]},{"raw_affiliation_string":"Fellow; School of Systems Engineering, the University of Reading, RG6 6AY, UK","institution_ids":["https://openalex.org/I71052956"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5025668908"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":21.3784,"has_fulltext":false,"cited_by_count":200,"citation_normalized_percentile":{"value":0.9958144,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"60","issue":"1","first_page":"30","last_page":"37"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/usb","display_name":"USB","score":0.8315705060958862},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6975269913673401},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5636038184165955},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5499352216720581},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5453464984893799},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5385433435440063},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.5355256795883179},{"id":"https://openalex.org/keywords/host-controller-interface","display_name":"Host controller interface","score":0.5111408829689026},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5006623268127441},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.49587878584861755},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.44512367248535156},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4392143189907074},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38627997040748596},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.32954680919647217},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3177146017551422},{"id":"https://openalex.org/keywords/usb-hub","display_name":"USB hub","score":0.26645326614379883},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.18988069891929626},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.142887145280838}],"concepts":[{"id":"https://openalex.org/C507366226","wikidata":"https://www.wikidata.org/wiki/Q42378","display_name":"USB","level":3,"score":0.8315705060958862},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6975269913673401},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5636038184165955},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5499352216720581},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5453464984893799},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5385433435440063},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.5355256795883179},{"id":"https://openalex.org/C37360884","wikidata":"https://www.wikidata.org/wiki/Q13551889","display_name":"Host controller interface","level":5,"score":0.5111408829689026},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5006623268127441},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.49587878584861755},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.44512367248535156},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4392143189907074},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38627997040748596},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.32954680919647217},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3177146017551422},{"id":"https://openalex.org/C61361435","wikidata":"https://www.wikidata.org/wiki/Q850053","display_name":"USB hub","level":4,"score":0.26645326614379883},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.18988069891929626},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.142887145280838},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tce.2014.6780922","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2014.6780922","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},{"id":"pmh:oai:centaur.reading.ac.uk:36555","is_oa":false,"landing_page_url":"https://centaur.reading.ac.uk/view/creators/90000807.html>","pdf_url":null,"source":{"id":"https://openalex.org/S4306402273","display_name":"CentAUR (University of Reading)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71052956","host_organization_name":"University of Reading","host_organization_lineage":["https://openalex.org/I71052956"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1608813708","https://openalex.org/W1646354800","https://openalex.org/W1880212920","https://openalex.org/W2010939995","https://openalex.org/W2028256681","https://openalex.org/W2044739833","https://openalex.org/W2048887528","https://openalex.org/W2060124823","https://openalex.org/W2067438990","https://openalex.org/W2081180447","https://openalex.org/W2093243364","https://openalex.org/W2095708839","https://openalex.org/W2097968625","https://openalex.org/W2107595704","https://openalex.org/W2122050126","https://openalex.org/W2124836189","https://openalex.org/W2139883876","https://openalex.org/W2142100656","https://openalex.org/W2149336128","https://openalex.org/W2570008916","https://openalex.org/W6636485689","https://openalex.org/W6639053789","https://openalex.org/W6681749759"],"related_works":["https://openalex.org/W2375965350","https://openalex.org/W2366100887","https://openalex.org/W2354525084","https://openalex.org/W2375098028","https://openalex.org/W2383464855","https://openalex.org/W2352906705","https://openalex.org/W2391103945","https://openalex.org/W2389023254","https://openalex.org/W2370062118","https://openalex.org/W1577036450"],"abstract_inverted_index":{"The":[0,110],"Universal":[1],"Serial":[2],"Bus":[3],"(USB)":[4],"is":[5,16,73,113],"an":[6],"extremely":[7],"popular":[8],"interface":[9],"standard":[10],"for":[11,69,134],"computer":[12],"peripheral":[13],"connections":[14],"and":[15,35,51,65,106,120],"widely":[17],"used":[18],"in":[19,48],"consumer":[20,27,135],"Mass":[21],"Storage":[22],"Devices":[23],"(MSDs).":[24],"While":[25],"current":[26],"USB":[28,43,71,136],"MSDs":[29,44,72],"provide":[30],"relatively":[31],"high":[32],"transmission":[33],"speed":[34],"are":[36],"convenient":[37],"to":[38,56,74,83,125],"carry,":[39],"the":[40,70,84,99,103,107,127],"use":[41],"of":[42,96,129],"has":[45],"been":[46,62],"prohibited":[47],"many":[49,94],"commercial":[50],"everyday":[52],"environments":[53],"primarily":[54],"due":[55],"security":[57,118,132],"concerns.":[58],"Security":[59],"protocols":[60],"have":[61],"previously":[63],"proposed":[64,111],"a":[66,116],"recent":[67],"approach":[68],"utilize":[75],"multi-factor":[76],"authentication.":[77],"This":[78],"paper":[79],"proposes":[80],"significant":[81],"enhancements":[82],"three-factor":[85],"control":[86],"protocol":[87,133],"that":[88],"now":[89],"makes":[90],"it":[91],"secure":[92],"under":[93],"types":[95],"attacks":[97],"including":[98],"password":[100],"guessing":[101],"attack,":[102,105],"denial-of-service":[104],"replay":[108],"attack.":[109],"solution":[112],"presented":[114],"with":[115],"rigorous":[117],"analysis":[119,124],"practical":[121],"computational":[122],"cost":[123],"demonstrate":[126],"usefulness":[128],"this":[130],"new":[131],"MSDs.":[137]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":19},{"year":2021,"cited_by_count":27},{"year":2020,"cited_by_count":26},{"year":2019,"cited_by_count":15},{"year":2018,"cited_by_count":20},{"year":2017,"cited_by_count":22},{"year":2016,"cited_by_count":15},{"year":2015,"cited_by_count":20},{"year":2014,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
