Modelling Smart Card Security Protocols in SystemC TLM.
Aisha Fouad BushagerMark ZwolinskiPublished in: EUC (2010)
Keyphrases
- smart card
- security protocols
- security mechanisms
- security requirements
- authentication protocol
- secure communication
- automated design
- rfid tags
- digital signature
- security services
- secret key
- security properties
- key management
- security analysis
- java card
- information security
- authentication scheme
- artificial immune algorithm
- remote user authentication scheme
- user authentication
- lightweight
- power analysis
- differential power analysis
- operating system
- data processing
- web services
- real time