Secure Deployment of Applications to Fielded Devices and Smart Cards.
William G. SirettJohn A. MacDonaldKeith MayesConstantinos MarkantonakisPublished in: WOSIS (2006)
Keyphrases
- smart card
- security requirements
- remote user authentication scheme
- digital signature
- authentication scheme
- authentication protocol
- password authentication
- security analysis
- security mechanisms
- secure communication
- sensitive data
- secret key
- information security
- java card
- key distribution
- public key infrastructure
- security model
- mobile devices
- mobile agent system
- power analysis
- differential power analysis
- key management
- key exchange protocol
- rfid tags
- key exchange
- sys tems
- diffie hellman
- identity management
- cryptographic protocols
- user authentication
- security issues
- embedded systems