Applicability of Smart Cards to Network User Authentication.
Marjan Krajewski Jr.John C. ChipchakDavid A. ChodorowJonathan T. TrostlePublished in: Comput. Syst. (1994)
Keyphrases
- smart card
- remote user authentication scheme
- user authentication
- authentication scheme
- security analysis
- authentication protocol
- packet filtering
- information security
- secret key
- password guessing
- java card
- computer networks
- digital signature
- security requirements
- wireless sensor networks
- network traffic
- biometric authentication
- public key infrastructure
- knowledge management