Developing a Trojan applets in a smart card.
Julien Iguchi-CartignyJean-Louis LanetPublished in: J. Comput. Virol. (2010)
Keyphrases
- smart card
- java card
- information security
- security analysis
- security requirements
- authentication scheme
- digital signature
- secret key
- fingerprint authentication
- remote user authentication scheme
- secure communication
- security enforcement
- security mechanisms
- authentication protocol
- power analysis
- byte code
- electronic cash