![]() ![]() Malware can intercept and/or modify this communication. This software is used for communicating with the smart card reader, which will then communicate with the smart card. In systems where the client’s computer is used as a terminal for accessing the smart card, software needs to be deployed and executed on the client side. Some service providers offer authentication with the use of smart cards. An efficient way for handling the authentication process is to use service providers that offer this. Preventing and Mitigating Client-Side Vulnerabilities of Smart Card Based e-ID ApplicationsĪbstract More and more companies are digitizing their services, this is because their customers demand it. Preventing and Mitigating Client-Side Vulnerabilities of Smart Card Based e-ID Applications Svein Roger Engen 1 Master’s Thesis Master of Science in Information Security 30 ECTS Department of Computer Science and Media Technology Gjøvik University College, 2012Īvdeling for informatikk og medieteknikk Høgskolen i Gjøvik Postboks 191 2802 Gjøvikĭepartment of Computer Science and Media Technology Gjøvik University College Box 191 N-2802 Gjøvik Norway Preventing and Mitigating Client-Side Vulnerabilities of Smart Card Based e-ID Applications Svein Roger Engen
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |