Use of smart cards for security of access to TRANSPAC through the telephone network and the ISDN.
Yvon RozePatrick PutJean-Pierre ThomasPublished in: ICCC (1988)
Keyphrases
- smart card
- sys tems
- access requests
- information security
- security requirements
- java card
- packet filtering
- security mechanisms
- security enforcement
- password authentication
- authentication protocol
- security analysis
- access control
- network security
- digital signature
- authentication scheme
- sensitive data
- network access
- secure communication
- security issues
- data flow
- power analysis
- information systems
- security policies
- peer to peer
- differential power analysis
- public key infrastructure
- rfid tags
- computer networks
- network traffic
- wireless networks
- usage statistics
- intrusion detection
- virtual private network
- countermeasures
- security model
- secret key