Virus in a smart card: Myth or reality?
Samiya HamadoucheJean-Louis LanetPublished in: J. Inf. Secur. Appl. (2013)
Keyphrases
- smart card
- information security
- security analysis
- digital signature
- java card
- authentication scheme
- fingerprint authentication
- security enforcement
- security requirements
- security mechanisms
- secure communication
- secret key
- authentication protocol
- remote user authentication scheme
- differential power analysis
- cost effective
- password authentication
- lightweight
- feature extraction