An improvement of Hsiang-Shih's authentication scheme using smart cards.
Sandeep K. SoodAnil Kumar SarjeKuldip SinghPublished in: ICWET (2010)
Keyphrases
- smart card
- authentication scheme
- secret key
- authentication protocol
- security analysis
- information security
- digital signature
- security flaws
- java card
- security requirements
- remote user authentication scheme
- sensitive data
- user authentication
- secure communication
- power analysis
- countermeasures
- security mechanisms
- password guessing