By Topic

Improving security in information technology using cryptographic hardware modules

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
R. Sanchez-Reillo ; Dpt. Tecnologia Electronica, Univ. Carlos III de Madrid, Leganes, Spain ; C. Sanchez-Avila ; C. Lopez-Ongil ; L. Entrena-Arrontes

It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased the security in some aspects, such as cryptographic algorithms, authentication techniques, etc. But many other security holes have appeared in this kind of applications, making the improvements achieved a "waste of time and money". In this paper, some of these security holes are exposed. Using security hardware modules can overcome some of these holes, if they are designed according to the applications' specification.

Published in:

Security Technology, 2002. Proceedings. 36th Annual 2002 International Carnahan Conference on

Date of Conference: