International Journal of Information and Computer Science
IJICS
international conference on cryptographic hardware and embedded systems (CHES), pp. 30–46, Lecture Notes in Computer Science, LNCS 3659. Springer, (2005). [13] RSA Laboratories. PKCS #11: Cryptographic Token Interface Standard. http://www.rsa.com/rsalabs/node.asp?id=2133, 2004. [Online]. Available: http://www.rsa.com/rsalabs/node.asp?id=2133 [14] S. Wefel and P. Molitor. Client hardware-token based single sign-on over several servers without trusted online third party
server. In: Proceedings of the 3rd international conference on security and assurance (ISA), Advances in information security and its spplication, pp. 29–36, Springer, ser. Communications in computer and information science (CCIS), vol. 36, (2009) June 25–27, Seoul, Korea. [15] D. J. Barrett, R. E. Silverman, and R. G. Byrnes. SSH, The Secure Shell: The Definitive Guide (2nd ed). O’Reilly Media, (2005).
IJICS Volume 1, Issue 3, June 2012 PP. 64-72 www.iji-cs.org © Science and Engineering Publishing Company
- 72 -