Keyphrases
- smart card
- security policies
- access control
- security requirements
- network security
- security management
- information security
- distributed systems
- security concerns
- java card
- network management
- digital signature
- secure communication
- security mechanisms
- access control policies
- remote user authentication scheme
- ubiquitous computing environments
- authentication protocol
- security analysis
- secret key
- unauthorized access
- countermeasures
- xml data
- database systems
- packet filtering
- databases