Autentizační hardwarový token nové generace
Title in English | Authentication Hardware Token of New Generation |
---|---|
Authors | |
Year of publication | 2006 |
Type | Article in Proceedings |
Conference | Datakon 2006 |
MU Faculty or unit | |
Citation | |
Field | Informatics |
Keywords | authentication;authorization;hardware token;hostile environment |
Description | In this paper we describe a new architecture of hardware tokens focusing on better protection of cryptographic keys stored on the tokens. The paper begins with a short case-study describing deployment of HW tokens in a grid environment, where the needs for a proper token protection are illustrated. We then discuss security of hardware tokens themselves, and finally present an approach that allows for secure use of tokens in a hostile environment. |
Related projects: |