(SC)²: A System to Secure Off-Card Contract-Policy Matching in Security-by-Contract for Open Multi-application Smart Cards.
Nicola DragoniEduardo LostalDavide PapiniPublished in: POLICY (2011)
Keyphrases
- smart card
- security requirements
- security mechanisms
- security analysis
- authentication protocol
- information security
- authentication scheme
- sensitive data
- factor authentication
- secure communication
- java card
- digital signature
- password authentication
- security issues
- remote user authentication scheme
- security model
- security properties
- security level
- secret key
- user authentication
- public key infrastructure
- diffie hellman
- sys tems
- security protocols
- packet filtering
- previously mentioned
- supply chain
- information systems
- trusted computing
- security measures
- key exchange
- access control mechanism
- key management
- access control policies
- network security