{"id":"https://openalex.org/W3096129203","doi":"https://doi.org/10.1109/tce.2020.3035566","title":"A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices","display_name":"A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices","publication_year":2020,"publication_date":"2020-11-01","ids":{"openalex":"https://openalex.org/W3096129203","doi":"https://doi.org/10.1109/tce.2020.3035566","mag":"3096129203"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2020.3035566","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2020.3035566","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041994467","display_name":"Muhammad Faizan Ayub","orcid":"https://orcid.org/0000-0001-7616-0420"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Muhammad Faizan Ayub","raw_affiliation_strings":["Department of Computer Science, COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan","COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan","institution_ids":["https://openalex.org/I16076960"]},{"raw_affiliation_string":"COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017367371","display_name":"Salman Shamshad","orcid":"https://orcid.org/0000-0002-8984-3199"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Salman Shamshad","raw_affiliation_strings":["Department of Computer Science, COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan","COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan","institution_ids":["https://openalex.org/I16076960"]},{"raw_affiliation_string":"COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023371922","display_name":"Khalid Mahmood","orcid":"https://orcid.org/0000-0001-5046-7766"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Khalid Mahmood","raw_affiliation_strings":["Department of Computer Science, COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan","COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan","institution_ids":["https://openalex.org/I16076960"]},{"raw_affiliation_string":"COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054720572","display_name":"SK Hafizul Islam","orcid":"https://orcid.org/0000-0002-2703-0213"},"institutions":[{"id":"https://openalex.org/I26072440","display_name":"Indian Institute of Information Technology Allahabad","ror":"https://ror.org/03rgjt374","country_code":"IN","type":"education","lineage":["https://openalex.org/I26072440"]},{"id":"https://openalex.org/I77501641","display_name":"University of Kalyani","ror":"https://ror.org/03v783k16","country_code":"IN","type":"education","lineage":["https://openalex.org/I77501641"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"SK Hafizul Islam","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Information Technology Kalyani, West Bengal, India","Indian Institute of Information Technology Kalyani, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Information Technology Kalyani, West Bengal, India","institution_ids":["https://openalex.org/I77501641","https://openalex.org/I26072440"]},{"raw_affiliation_string":"Indian Institute of Information Technology Kalyani, West Bengal, India","institution_ids":["https://openalex.org/I77501641","https://openalex.org/I26072440"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087589295","display_name":"Reza M. Parizi","orcid":"https://orcid.org/0000-0002-0049-4296"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Reza M. Parizi","raw_affiliation_strings":["College of Computing and Software Engineering, Kennesaw State University, Marietta, GA, USA"],"affiliations":[{"raw_affiliation_string":"College of Computing and Software Engineering, Kennesaw State University, Marietta, GA, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, the Department of Electrical and Computer Engineering, and the Department of Computer Science, University of Texas at San Antonio, San Antonio, TX, USA","University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, the Department of Electrical and Computer Engineering, and the Department of Computer Science, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]},{"raw_affiliation_string":"University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5041994467"],"corresponding_institution_ids":["https://openalex.org/I16076960"],"apc_list":null,"apc_paid":null,"fwci":4.8044,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.95620109,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"66","issue":"4","first_page":"396","last_page":"405"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/usb","display_name":"USB","score":0.7923060655593872},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7116227149963379},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5894424319267273},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5640588402748108},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5529706478118896},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.5462037324905396},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5456883907318115},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.5406765937805176},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.49290990829467773},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.4668384790420532},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44376614689826965},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.39538106322288513},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3705950379371643},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1946890652179718},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.17870855331420898},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.16726472973823547}],"concepts":[{"id":"https://openalex.org/C507366226","wikidata":"https://www.wikidata.org/wiki/Q42378","display_name":"USB","level":3,"score":0.7923060655593872},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7116227149963379},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5894424319267273},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5640588402748108},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5529706478118896},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.5462037324905396},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5456883907318115},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.5406765937805176},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.49290990829467773},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.4668384790420532},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44376614689826965},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.39538106322288513},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3705950379371643},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1946890652179718},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.17870855331420898},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.16726472973823547},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tce.2020.3035566","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2020.3035566","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},{"id":"pmh:oai:digitalcommons.kennesaw.edu:facpubs-5903","is_oa":false,"landing_page_url":"https://digitalcommons.kennesaw.edu/facpubs/4755","pdf_url":null,"source":{"id":"https://openalex.org/S4377196456","display_name":"DigitalCommons - Kennesaw State University (Kennesaw State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172980758","host_organization_name":"Kennesaw State University","host_organization_lineage":["https://openalex.org/I172980758"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty Publications","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1502388574","https://openalex.org/W1584717707","https://openalex.org/W2052267638","https://openalex.org/W2059212242","https://openalex.org/W2076392080","https://openalex.org/W2081180447","https://openalex.org/W2105114022","https://openalex.org/W2113999696","https://openalex.org/W2127451689","https://openalex.org/W2142100656","https://openalex.org/W2243440073","https://openalex.org/W2563009067","https://openalex.org/W2775758566","https://openalex.org/W2902875076","https://openalex.org/W2929882734","https://openalex.org/W3012181873","https://openalex.org/W6677048494"],"related_works":["https://openalex.org/W4256170434","https://openalex.org/W2360288732","https://openalex.org/W2379137242","https://openalex.org/W4233948907","https://openalex.org/W4235220108","https://openalex.org/W4315650027","https://openalex.org/W2758694247","https://openalex.org/W2356928735","https://openalex.org/W2367116219","https://openalex.org/W4238894392"],"abstract_inverted_index":{"Universal":[0],"Serial":[1],"Bus":[2],"(USB)":[3],"is":[4,72,90,120],"widely":[5],"used,":[6],"for":[7],"example":[8],"to":[9,23,53,60,92],"facilitate":[10],"hot-swapping":[11],"and":[12,38,48,86,98,130],"plug-and-play.":[13],"However,":[14,68],"USB":[15,46,56],"ports":[16],"can":[17],"be":[18],"exploited":[19],"by":[20],"an":[21,127],"adversary":[22],"extract":[24],"private":[25],"or":[26],"personal":[27],"data":[28],"from":[29,44],"the":[30,81,105,110,116,135],"connected":[31],"devices.":[32],"Hence,":[33],"a":[34],"number":[35],"of":[36,112],"organizations":[37],"workplaces":[39],"have":[40,50],"prohibited":[41],"their":[42],"employees":[43],"using":[45],"devices,":[47],"there":[49],"been":[51],"efforts":[52],"design":[54,122],"secure":[55,133],"storage":[57],"device":[58],"schemes":[59,71],"more":[61],"effectively":[62],"resist":[63],"different":[64],"known":[65],"security":[66],"attacks.":[67],"designing":[69],"such":[70,94],"challenging.":[73],"For":[74],"example,":[75],"in":[76,115,134],"this":[77],"article":[78],"we":[79,125],"revisit":[80],"Wei":[82],"et":[83],"al.'s":[84],"scheme,":[85],"demonstrate":[87],"that":[88,104],"it":[89,132],"vulnerable":[91],"attacks":[93],"as":[95],"password":[96],"guessing":[97],"user":[99],"impersonation.":[100],"We":[101],"also":[102],"explain":[103],"scheme":[106,129],"does":[107],"not":[108],"verify":[109],"correctness":[111],"user's":[113],"input":[114],"login":[117],"phase,":[118],"which":[119],"another":[121],"flaw.":[123],"Then,":[124],"present":[126],"improved":[128],"prove":[131],"random":[136],"oracle":[137],"model.":[138]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":8}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
