Making Smart Cards Truly Portable.
HongQian Karen LuAsad M. AliPublished in: IEEE Secur. Priv. (2010)
Keyphrases
- smart card
- java card
- information security
- security analysis
- security requirements
- secret key
- digital signature
- authentication scheme
- differential power analysis
- power analysis
- security mechanisms
- secure communication
- authentication protocol
- remote user authentication scheme
- packet filtering
- fingerprint authentication