Practical and Secure Recovery of Disk Encryption Key Using Smart Cards.
Kazumasa OmoteKazuhiko KatoPublished in: IEICE Trans. Inf. Syst. (2010)
Keyphrases
- encryption key
- smart card
- security requirements
- digital signature
- remote user authentication scheme
- authentication scheme
- security analysis
- authentication protocol
- secure communication
- security mechanisms
- password authentication
- digital content
- sensitive data
- information security
- digital rights management
- secret key
- java card
- power analysis
- information systems
- factor authentication
- differential power analysis
- digital libraries
- encryption scheme
- security model
- ad hoc networks