Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where HongQian Karen Lu is active.

Publication


Featured researches published by HongQian Karen Lu.


international conference on information security | 2004

Prevent Online Identity Theft – Using Network Smart Cards for Secure Online Transactions

HongQian Karen Lu; Asad Mahboob Ali

This paper presents a novel method that can be used to prevent online identity theft and thereby ensure secure online transactions. In particular, the method combats online identity theft mechanisms that capture information on the computer before the information is encrypted. The key feature of this method is the use of secure network smart cards to establish secure connections between the smart card and remote Internet nodes. Using this end-to-end secure connection, one can securely exchange confidential information between the smart card and a trusted remote server. Any intermediate node, including the host computer to which the smart card is connected, cannot compromise this secure connection.


international conference on systems | 2008

Communication Security between a Computer and a Hardware Token

HongQian Karen Lu; Asad M. Ali

Hardware security tokens are gradually gaining popularity as tools for strong online authentication and secure storage of personal information. The security services they offer protect online service providers as well as consumers. These tokens are small embedded systems that typically have little or no human interface themselves. They work with software on the host computer for human interface and for interaction with programs on the computer or over the Internet. Since these security tokens typically provide cryptographic services and secure storage, the security of communication between the token and the host computer is a critical piece of the overall security framework. The design of this piece is a challenging task. It requires solving multiple problems, such as ensuring that the hardware token only talks with a legitimate host application; exchanging encryption keys; and minimizing the impact on communication performance. This paper presents our solutions to these problems. These solutions are applicable in a variety of hardware security tokens.


international conference on systems | 2008

Attack Detection for Resource-Constrained Network Devices

HongQian Karen Lu

Many small devices are capable of connecting to the Internet now. The trend of pervasive computing and networking is going strong. At the same time, security threats on the Internet continue to increase. Existing defense mechanisms against network-based attacks can hardly apply to small network devices due to limitations of their computing resources. This paper presents a method to mitigate this problem. The approach embeds the attack detection mechanism inside the devices network module. It focuses on the operational behavior of the module to identify abnormal events. The mechanism does not compete for resources with the main function of the device. It has little impact on the system performance. Furthermore, the method may detect unknown attacks.


Archive | 2003

System and method for preventing identity theft using a secure computing device

HongQian Karen Lu; Asad Mahboob Ali


Archive | 2004

Secure networking using a resource-constrained device

HongQian Karen Lu; Michael Montgomery; Asad Mahboob Ali


Archive | 2007

Method and system of providing security services using a secure device

Asad Mahboob Ali; HongQian Karen Lu; Apostol Vassilev; Ed Dolph


Archive | 2008

Method of preventing web browser extensions from hijacking user information

HongQian Karen Lu; Asad Mahboob Ali; Kapil Sachdeva


Archive | 2007

METHOD OF PATCHING APPLICATIONS ON SMALL RESOURCE-CONSTRAINED SECURE DEVICES

HongQian Karen Lu; Asad Mahboob Ali; Apostol Vassilev; Michael Montgomery; Michael David Hutchinson


Archive | 2006

System and method for data communications allowing slave device to be network peers

HongQian Karen Lu; Michael Montgomery


Archive | 2012

User to user delegation service in a federated identity management environment

HongQian Karen Lu; Ksheerabdhi Krishna; Kapil Sachdeva

Collaboration


Dive into the HongQian Karen Lu's collaboration.

Researchain Logo
Decentralizing Knowledge