Secure Upgrade of Hardware Security Modules in Bank Networks.
Riccardo FocardiFlaminia L. LuccioPublished in: ARSPA-WITS (2010)
Keyphrases
- security requirements
- security patterns
- security issues
- security mechanisms
- security level
- trusted computing
- security measures
- security management
- key management
- security properties
- functional modules
- access control
- security protocols
- authentication mechanism
- security analysis
- data encryption
- information security
- security services
- sensitive data
- random number generator
- stream cipher
- identity management
- security model
- authentication protocol
- cryptographic protocols
- low cost
- security threats
- secure communication
- security architecture
- key exchange protocol
- intrusion detection
- data security
- security policies
- previously mentioned
- protection schemes
- electronic voting
- integrity verification
- social networks
- network structure
- smart card
- key agreement protocol
- advanced encryption standard
- computer systems
- protection scheme
- key exchange
- secure multiparty computation
- encryption scheme
- user authentication
- public key encryption
- key agreement
- private key
- privacy preserving
- computer networks
- diffie hellman
- network security
- graphical password
- digital rights management
- mobile agent system
- secure routing
- application level
- digital signature scheme
- authentication scheme