Improving the Client Security Using the Smart Card and Trusted Server.
Hossein Rezaei GhalehMohammad-Ali DoostariPublished in: Security and Management (2009)
Keyphrases
- smart card
- authentication protocol
- outsourced databases
- security requirements
- information security
- java card
- client server
- security mechanisms
- security analysis
- fuzzy vault
- sensitive data
- authentication scheme
- central server
- factor authentication
- tcp ip
- security enforcement
- sys tems
- secure communication
- network connection
- digital signature
- user authentication
- encrypted data
- differential power analysis
- client server architecture
- secret key
- countermeasures
- security issues
- password authentication
- network communication
- power analysis
- remote user authentication scheme
- distributed environment
- authentication mechanism
- ip address
- security protocols
- cryptographic protocols
- trusted computing
- rfid tags
- public key
- distributed databases
- security model
- lightweight