An empirical study of smart card technology.
Gregory E. TrumanKent SandoeTasha RifkinPublished in: Inf. Manag. (2003)
Keyphrases
- smart card
- digital signature
- information security
- java card
- security analysis
- security requirements
- case study
- authentication scheme
- differential power analysis
- password authentication
- security enforcement
- authentication protocol
- remote user authentication scheme
- fingerprint authentication
- power analysis
- secure communication
- secret key
- key technologies
- data processing
- low cost
- security mechanisms
- pattern matching