Secure Software Smartcard Resilient to Capture.
Seung Wook JungChristoph RulandPublished in: CIS (2) (2005)
Keyphrases
- smart card
- security requirements
- secure communication
- security analysis
- authentication scheme
- remote user authentication scheme
- authentication protocol
- sensitive data
- digital signature
- security mechanisms
- password authentication
- secret key
- factor authentication
- fingerprint authentication
- information security
- software development
- java card
- key management
- public key
- diffie hellman
- user authentication
- cryptographic protocols
- security protocols
- key exchange protocol
- software architecture
- computer systems
- access control
- source code