Secure Authentication Through Insecure Systems: An Innovative Approach to Smart Card Login.
Asad M. AliKaren LuPublished in: International Conference on Internet Computing (2009)
Keyphrases
- authentication scheme
- smart card
- authentication protocol
- user authentication
- security requirements
- security analysis
- password authentication
- secret key
- security mechanisms
- sys tems
- secure communication
- key distribution
- information security
- digital signature
- remote user authentication scheme
- security systems
- distributed systems
- biometric systems
- diffie hellman
- sensitive data
- data encryption
- differential power analysis
- lightweight
- resource constrained
- power analysis
- authentication systems
- factor authentication
- fingerprint authentication