Security enhancement scheme for mobile device using H/W cryptographic module.
Seungyong YoonByoung-Koo KimYousung KangPublished in: ICTC (2023)
Keyphrases
- secure communication
- elliptic curve cryptography
- mobile devices
- key management
- public key encryption
- encryption key
- security protocols
- public key cryptography
- security properties
- security analysis
- key distribution
- smart card
- elliptic curve
- encryption scheme
- authentication scheme
- authentication protocol
- access control
- context aware
- protection scheme
- diffie hellman
- high security
- cryptographic protocols
- key agreement
- protection schemes
- digital signature scheme
- public key
- fuzzy vault
- security requirements
- authentication mechanism
- encryption decryption
- image enhancement
- remote server
- hash functions
- information security
- intrusion detection
- cryptographic algorithms
- random number generator
- ad hoc networks
- provably secure
- location aware
- mobile computing
- mobile networks
- secret sharing scheme
- standard model
- security services
- private key
- secret sharing
- mobile commerce
- digital signature
- security model
- security issues
- mobile computing environment
- data security
- secret key