User Authentication with Smart Cards in Trusted Computing Architecture.
Patrick GeorgePublished in: Security and Management (2004)
Keyphrases
- smart card
- remote user authentication scheme
- user authentication
- authentication scheme
- authentication protocol
- security analysis
- trusted computing
- information security
- computing platform
- computer security
- virtual organization
- password guessing
- secret key
- security requirements
- security mechanisms
- cloud computing
- computing environments
- software architecture
- authentication systems
- sensitive data
- database
- security issues
- distributed computing
- intelligent agents
- databases