Modelling the Security of Smart Cards by Hard and Soft Types for Higher-Order Mobile Embedded Resources.
Mikkel BundgaardThomas T. HildebrandtJens Chr. GodskesenPublished in: Electron. Notes Theor. Comput. Sci. (2007)
Keyphrases
- smart card
- higher order
- information security
- java card
- security requirements
- security mechanisms
- security analysis
- sys tems
- authentication protocol
- secure communication
- sensitive data
- authentication scheme
- digital signature
- public key infrastructure
- secret key
- security issues
- password authentication
- factor authentication
- network security
- computing environments
- mobile devices
- differential power analysis
- intrusion detection
- remote user authentication scheme
- power analysis
- security model
- access requests
- embedded systems
- access control
- countermeasures
- security policies
- key management
- public key
- resource constraints