Application-binding protocol in the user centric smart card ownership model
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Hi-index | 0.00 |
For the end-user of IT (Information Technologies) prod- ucts, several questions exist about their real security. For instance, in the case of a smart card which is the more se- cure device in the collective mind, how to have confidence in a card bought anywhere? How to be sure that the held cards have been subjected to security evaluation/certification pro- cesses and which level of trust could be expected? These questions can be shifted to the providers of secure IT solu- tions.