Formal security analysis of PKCS#11 and proprietary extensions.
Stéphanie DelauneSteve KremerGraham SteelPublished in: J. Comput. Secur. (2010)
Keyphrases
- security analysis
- smart card
- public key
- high security
- security properties
- security requirements
- security model
- open source
- user authentication
- image encryption
- mutual authentication
- encryption scheme
- authentication protocol
- formal model
- encryption algorithm
- formal methods
- data warehouse
- databases
- authentication scheme
- distributed environment
- case study