ROI, Pitfalls and Best Practices with an Enterprise Smart Card Deployment.
Philip HoyerPublished in: ISSE (2009)
Keyphrases
- smart card
- region of interest
- design patterns
- java card
- security requirements
- authentication protocol
- information security
- digital signature
- data analytics
- remote user authentication scheme
- authentication scheme
- secret key
- case study
- knowledge management
- security analysis
- security mechanisms
- palmprint
- software engineering
- secure communication
- security enforcement
- differential power analysis
- open source
- power analysis
- web services