Authentication and authenticated key exchanges
Designs, Codes and Cryptography
The performance of public key-enabled kerberos authentication in mobile computing applications
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Design of Rijndael
Smart Card Handbook
Just fast keying: Key agreement in a hostile internet
ACM Transactions on Information and System Security (TISSEC)
Which security policy for multiplication smart cards?
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Which Trust Can Be Expected of the Common Criteria Certification at End-User Level?
FGCN '07 Proceedings of the Future Generation Communication and Networking - Volume 02
The modelling and analysis of security protocols: the csp approach
The modelling and analysis of security protocols: the csp approach
Tandem Smart Cards: Enforcing Trust for TLS-Based Network Services
ASWN '08 Proceedings of the 2008 Eighth International Workshop on Applications and Services in Wireless Networks
Collaboration of SSL smart cards within the WEB2 landscape
CTS '09 Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems
Application Management Framework in User Centric Smart Card Ownership Model
Information Security Applications
A Paradigm Shift in Smart Card Ownership Model
ICCSA '10 Proceedings of the 2010 International Conference on Computational Science and Its Applications
Design, installation and execution of a security agent for mobile stations
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
New directions in cryptography
IEEE Transactions on Information Theory
A Privacy Preserving Application Acquisition Protocol
TRUSTCOM '12 Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
Load time code validation for mobile phone Java Cards
Journal of Information Security and Applications
Hi-index | 0.00 |
Near Field Communication (NFC) has reinvigorated the multi-application smart card initiative. The NFC trials are relying on an extension of Issuer Centric Smart Card Model (ICOM) referred as Trusted Service Manager (TSM) architecture, which may create market segregation. Where the User Centric Smart Card Ownership Model (UCOM) takes an opposite approach of delegating the smart card ownership to its users. Therefore, to reconcile these two approaches we proposed the Coopetitive Architecture for Smart Cards (CASC) that avoids market segregation, increase revenue generation, and provide flexibility, robustness, and scalability. To support the CASC framework in this paper, we propose an application installation protocol that provides entity authentication, trust assurance and validation, mutual key and contractual-agreement generation. The protocol is compared with existing protocols on its performance, stated security, and operational goals. Furthermore, CasperFDR is used to provide a mechanical formal analysis of the protocol.