": a comparison of smart replicas, smart cards, and phones.
Daniela PetrelliSinead O'BrienPublished in: UbiComp Adjunct (2016)
Keyphrases
- smart card
- information security
- remote user authentication scheme
- authentication protocol
- fault tolerance
- digital signature
- security analysis
- java card
- secret key
- security requirements
- load balancing
- power analysis
- differential power analysis
- mobile phone
- security mechanisms
- authentication scheme
- e government
- packet filtering