作成者 |
|
|
|
|
本文言語 |
|
発行日 |
|
収録物名 |
|
出版タイプ |
|
アクセス権 |
|
関連DOI |
|
関連URI |
|
関連情報 |
|
概要 |
In multi-application IC card systems, when a user’s card and an application provider’s terminal interacts, it must be assured that only legitimate parties are allowed to initiate any corresponding app...lication process, and that the initiators must not be replaced by others until the end of the application process. In this paper, we address the latter as a requirement for binding authentication with application execution, and discuss a protocol that provides the binding by using secure session keys generated from secret information shared by the corresponding parties.続きを見る
|