Security analysis of a fingerprint-protected USB drive.
Benjamin RodesXunhua WangPublished in: ACSAC (2010)
Keyphrases
- security analysis
- smart card
- sensitive data
- security requirements
- security model
- high security
- public key
- information security
- image encryption
- security mechanisms
- encryption algorithm
- security properties
- authentication protocol
- mutual authentication
- user authentication
- authentication scheme
- secret key
- proxy signature scheme
- database systems
- encryption scheme
- cost effective
- data warehouse
- feature extraction