2003
DOI: 10.1007/978-3-540-39650-5_11
|View full text |Cite
|
Sign up to set email alerts
|

Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2006
2006
2010
2010

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…We have shown how the Caernarvon authentication protocol [38] can solve most of the vulnerabilities, without giving up flexibility is the use of PIV cards.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…We have shown how the Caernarvon authentication protocol [38] can solve most of the vulnerabilities, without giving up flexibility is the use of PIV cards.…”
Section: Discussionmentioning
confidence: 99%
“…To avoid these privacy problems, IBM developed the Caernarvon authentication protocol [38] that preserves the card holder's privacy by revealing nothing until the reader has been authenticated. Very briefly, the Caernarvon protocol generates a Diffie-Hellman 6 session key first to protect all subsequent communications from external eavesdroppers.…”
Section: Solving the Chuid Exposurementioning
confidence: 99%
See 3 more Smart Citations