Security on Your Hand: Secure Filesystems with a "Non-Cryptographic" JAVA-Ring.
Rüdiger WeisBastiaan BakkerStefan LucksPublished in: Java Card Workshop (2000)
Keyphrases
- key management
- security protocols
- security properties
- cryptographic protocols
- encryption scheme
- security requirements
- smart card
- public key encryption
- encryption key
- secure communication
- stream cipher
- security mechanisms
- security issues
- cryptographic algorithms
- security analysis
- encryption decryption
- mobile agent system
- security services
- java card
- public key cryptography
- digital signature
- security measures
- authentication protocol
- security level
- key distribution
- security management
- diffie hellman
- provably secure
- resource constrained
- security model
- advanced encryption standard
- information security
- authentication scheme
- data encryption
- ad hoc networks
- secret key
- high assurance
- key agreement
- sensitive data
- security patterns
- homomorphic encryption
- private key
- elliptic curve cryptography
- access control
- authentication mechanism
- hash functions
- public key
- digital rights management
- key exchange
- user authentication
- key agreement protocol
- key exchange protocol
- data security
- trusted third party
- encryption algorithms
- standard model
- high security
- lightweight
- wireless sensor networks
- block cipher