Smart card security and applications
Smart card security and applications
Java Card Technology for Smart Cards: Architecture and Programmer's Guide
Java Card Technology for Smart Cards: Architecture and Programmer's Guide
Optical Fault Induction Attacks
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Using Memory Errors to Attack a Virtual Machine
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Secure Distributed Computing on a Java Card" Grid
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 5 - Volume 06
Design principles for tamper-resistant smartcard processors
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Gpu gems 3
Improving Security in Grids Using the Smart Card Technology
GRID '06 Proceedings of the 7th IEEE/ACM International Conference on Grid Computing
Smart Cards, Tokens, Security and Applications
Smart Cards, Tokens, Security and Applications
Hi-index | 0.00 |
Computing power is largely becoming a basic supply which you can envisage to buy from a provider like you buy power or water. This is the result of a now long running trend that consists in connecting computing resources together so as to set up what can globally be referred to as a remote computing platform, the most up-to-date incarnation of which is the notion of a grid (Foster and Kesselman, 2003). These resources can then be shared among users, what means circulating codes and the results of their execution over a network, what is highly insecure. At the other end of the spectrum of computing devices, smart cards (Mayes and Markantonakis, 2008; Hendry, 2001) offer extremely secure but extremely limited computing capabilities. The question is thus to bridge the gap between computational power and high security. The aim of this paper is to show how large and high capacity remote computing architectures can interact with smart cards, which certainly are the most widely deployed, still the smallest computing systems of the information technology era, so as to improve the overall security of a global infrastructure.