Secure Internet Smartcards
dc.contributor.author | Itoi, Naomaru | en_US |
dc.contributor.author | Fukuzawa, Tomoko | en_US |
dc.contributor.author | Honeyman, Peter | en_US |
dc.date.accessioned | 2014-07-18T18:11:55Z | |
dc.date.available | 2014-07-18T18:11:55Z | |
dc.date.issued | 2000-08-24 | en_US |
dc.identifier.citation | N. Itoi, T. Fukuzawa, and P. Honeyman, "Secure Internet Smartcards," August 2000. Java Card Workshop, Cannes (September 2000)] <http://hdl.handle.net/2027.42/107908> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107908 | |
dc.description.abstract | In this paper, we describe middleware that (1) enables secure communication between a host and a remote smartcard and (2) provides a unique name, regardless of card location. Smartcards have traditionally been isolated from computer networks, communicating exclusively with the host computers to which they are attached through a serial port. This era is ending, in part due to the flexibility and programmability of Java-Cards. Researchers are beginning to communicate with smartcards using Internet protocols. This work extends the Internet infrastructure to allow secure access to remote smartcards, communicating encrypted payloads over UDP/IP. Session key establishment uses a PIN-based encrypted key exchange called SPEKE. We describe two applications that use this infrastructure, Kerberos and SSH, discuss performance and security concerns, and highlight the security and convenience benefits of using Internet smartcards for personal key storage and cryptography. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | Secure Internet Smartcards | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationum | Center for Information Technology Integration | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107908/1/citi-tr-00-6.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.