Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients.
Guenther StarnbergerLorenz FroihoferKarl M. GöschkaPublished in: ARES (2010)
Keyphrases
- smart card
- sensitive data
- information security
- security requirements
- java card
- third party
- authentication scheme
- security analysis
- digital signature
- security properties
- secure communication
- differential power analysis
- security mechanisms
- privacy preserving
- authentication protocol
- secret key
- security policies
- power analysis
- packet filtering
- remote user authentication scheme
- password authentication
- information systems