Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks.
Saar DrimerSteven J. MurdochPublished in: USENIX Security Symposium (2007)
Keyphrases
- smart card
- java card
- security mechanisms
- remote user authentication scheme
- power analysis
- fingerprint authentication
- digital signature
- security analysis
- upper bound
- information security
- secret key
- authentication protocol
- secure communication
- security requirements
- countermeasures
- security systems
- authentication scheme
- computer security
- watermarking scheme
- fuzzy vault
- rfid tags