Certificate-Based Authentication Using Hardware Cryptographic Devices.
Radek DolezelJens Myrup PedersenPublished in: IP&C (2011)
Keyphrases
- authentication mechanism
- factor authentication
- public key encryption
- public key infrastructure
- public key cryptography
- embedded systems
- smart card
- random number generator
- data encryption
- embedded devices
- protection schemes
- low end
- personal computer
- processing capabilities
- public key
- low cost
- high end
- camera phones
- security protocols
- hardware and software
- mobile terminals
- digital signature
- hardware platforms
- security services
- encryption decryption
- real time
- key management
- fuzzy vault
- authentication protocol
- secure communication
- mobile devices
- security mechanisms
- biometric authentication
- computer systems
- mobile handheld devices
- hash functions
- security model
- reconfigurable hardware
- authentication scheme
- random number
- secret sharing scheme
- elliptic curve cryptography
- proxy re encryption
- security analysis
- key distribution
- encryption scheme
- security requirements
- computing systems
- hardware implementation