Review Article
A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
Table 8
Protocol execution times.
| Protocol instance | Duration (min:sec.ms) |
| ReadOut of transponder | 01:32.000 | Mutual authentication of UD and TRK | 03:14.000 |
| Direct keyflashing | | Keyflashing to transponder by OEM | 23:50.000 |
| Keyflashing by servicePoint | | Delegation of trust OEM to SP | 00:00.350 | Transponderdelegation | 00:00.250 | Keyflashing to transponder by SP | 12:43.000 |
|
|