Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards.
Youngsook LeeJunghyun NamDongho WonPublished in: KES-AMSTA (2008)
Keyphrases
- smart card
- authentication scheme
- security flaws
- information security
- security mechanisms
- secret key
- authentication protocol
- digital signature
- java card
- security requirements
- security issues
- countermeasures
- sensitive data
- security analysis
- secure communication
- power analysis
- user authentication
- database systems
- region of interest