Protection Profiles and Generic Security Targets for Smart Cards as Secure Signature Creation Devices - Existing Solutions for the Payment Sector.
Gisela MeisterMichael VogelPublished in: E-smart (2001)
Keyphrases
- smart card
- information security
- digital signature
- security requirements
- security level
- security mechanisms
- security issues
- security patterns
- security analysis
- authentication protocol
- sensitive data
- secret key
- secure communication
- data confidentiality
- authentication scheme
- private key
- java card
- public key infrastructure
- payment systems
- remote user authentication scheme
- blind signature
- key management
- security model
- countermeasures
- security architecture
- network security
- password authentication
- blind signature scheme
- user authentication
- security properties
- sys tems
- electronic payment
- data protection
- public key cryptography
- rfid tags
- key exchange
- password guessing
- data security
- data integrity
- mobile agent system
- mobile payment
- security protocols
- intrusion detection
- packet filtering
- access requests
- key distribution
- information systems
- diffie hellman
- security services
- encryption scheme
- resource constrained
- power analysis
- public key