Keyphrases
- authentication scheme
- smart card
- security flaws
- secret key
- authentication protocol
- information security
- security analysis
- security mechanisms
- java card
- real time
- security requirements
- secure communication
- digital signature
- user authentication
- public key
- remote user authentication scheme
- e government
- low cost
- sensitive data