In this paper we present different ways for an attacker to tamper with a digital signature scheme. The paper focuses on smartcard-based signature schemes because they offer the best ratio of cost over security. The risks of compromise or attack for each part of the system used to produce the signature are assessed and possible solutions for the problems illustrated are suggested. In fact, the smartcard is often the most secure link in the chain of trust involved in digital signature systems
The design of secure and efficient smart-card-based password authentication schemes remains a challe...
We consider the security of the Rila-Mitchell security protocols recently proposed for biometrics-ba...
We study the security requirements for remote authentication with password protected smart card. In ...
People use their personal computers, laptops, tablets and smart phones to digitally sign documents i...
Two signature systems based on smart cards and fingerprint features are proposed. In one signature s...
Smart card based password for authentication has become a common trend. Although smart card brings c...
This paper presents a formal security policy model for Smart-Cards with digital signature applicatio...
Abstract. In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme usi...
Fingerprint has usually been used for verification function in order to resist illegal access to sec...
Treball realitzat a la Akademia Górniczo-Hutnicza KrakowieIn the current digital world, digital sign...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
Abstract. We study the security requirements for remote authentication with password protected smart...
Abstract- Session key agreement protocol using smart card is extremely popular in client-server envi...
This paper initiates the study of two specific security threats on smart-card-based password authent...
Abstract. Smart card has been adopted to various applications. In 2000, Hwang and Li proposed a remo...
The design of secure and efficient smart-card-based password authentication schemes remains a challe...
We consider the security of the Rila-Mitchell security protocols recently proposed for biometrics-ba...
We study the security requirements for remote authentication with password protected smart card. In ...
People use their personal computers, laptops, tablets and smart phones to digitally sign documents i...
Two signature systems based on smart cards and fingerprint features are proposed. In one signature s...
Smart card based password for authentication has become a common trend. Although smart card brings c...
This paper presents a formal security policy model for Smart-Cards with digital signature applicatio...
Abstract. In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme usi...
Fingerprint has usually been used for verification function in order to resist illegal access to sec...
Treball realitzat a la Akademia Górniczo-Hutnicza KrakowieIn the current digital world, digital sign...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
Abstract. We study the security requirements for remote authentication with password protected smart...
Abstract- Session key agreement protocol using smart card is extremely popular in client-server envi...
This paper initiates the study of two specific security threats on smart-card-based password authent...
Abstract. Smart card has been adopted to various applications. In 2000, Hwang and Li proposed a remo...
The design of secure and efficient smart-card-based password authentication schemes remains a challe...
We consider the security of the Rila-Mitchell security protocols recently proposed for biometrics-ba...
We study the security requirements for remote authentication with password protected smart card. In ...