Interleaving Commands: a Threat to the Interoperability of Smartcard Based Security Applications
Maurizio TalamoMaulahikmah GaliniumChristian H. SchunckFranco ArcieriPublished in: CoRR (2012)
Keyphrases
- smart card
- information security
- security requirements
- java card
- countermeasures
- security analysis
- fuzzy vault
- security mechanisms
- sensitive data
- secure communication
- security enforcement
- authentication protocol
- authentication scheme
- access requests
- security issues
- digital signature
- information systems
- security model
- web services
- security level
- fingerprint authentication
- security systems
- communication networks
- network security
- secret key
- tcp ip
- access control
- static analysis
- security policies
- security protocols
- intrusion detection
- key exchange protocol
- data storage