A taxonomy of various attacks on smart card-based applications and countermeasures.
B. B. GuptaMegha QuamaraPublished in: Concurr. Comput. Pract. Exp. (2021)
Keyphrases
- countermeasures
- smart card
- information security
- java card
- power analysis
- differential power analysis
- computer security
- security analysis
- security issues
- security requirements
- authentication scheme
- security measures
- network security
- security mechanisms
- digital signature
- cyber attacks
- remote user authentication scheme
- authentication protocol
- secret key
- sensitive data
- information systems
- security breaches
- data mining
- databases