Efficient implementation of anonymous credentials on Java Card smart cards.
Michaël SterckxBenedikt GierlichsBart PreneelIngrid VerbauwhedePublished in: WIFS (2009)
Keyphrases
- efficient implementation
- java card
- smart card
- fault injection
- byte code
- security requirements
- information security
- hardware implementation
- secret key
- access control
- digital signature
- security analysis
- security mechanisms
- countermeasures
- power analysis
- static analysis
- access control policies
- sensitive data
- tcp ip
- information systems
- peer to peer
- database systems