Distributed digital-ticket management for rights trading system
Proceedings of the 1st ACM conference on Electronic commerce
Formal Methods in System Design
Is the performance of smart card cryptographic functions the real bottleneck?
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Security-driven exploration of cryptography in DSP cores
Proceedings of the 15th international symposium on System Synthesis
Smart card embedded information systems: a methodology for privacy oriented architectural design
Data & Knowledge Engineering - DKE 40
PAKDD '01 Proceedings of the 5th Pacific-Asia Conference on Knowledge Discovery and Data Mining
Specification of a Smart Card Operating System
TYPES '99 Selected papers from the International Workshop on Types for Proofs and Programs
A Personal Naming and Directory Service for UMTS Users
IS&N '99 Proceedings of the 6th International Conference on Intelligence and Services in Networks: Paving the Way for an Open Service Market
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
IEEE Transactions on Computers
Logical and physical design issues for smart card databases
ACM Transactions on Information Systems (TOIS)
Energy-efficient data scrambling on memory-processor interfaces
Proceedings of the 2003 international symposium on Low power electronics and design
A new CRT-RSA algorithm secure against bellcore attacks
Proceedings of the 10th ACM conference on Computer and communications security
Current security management & Ethical issues of information technology
The use of smart devices in eHealth
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
iJADE Web-Miner: An Intelligent Agent Framework for Internet Shopping
IEEE Transactions on Knowledge and Data Engineering
Design of secure cryptography against the threat of power-attacks in DSP-embedded processors
ACM Transactions on Embedded Computing Systems (TECS)
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
Securing e-business applications using smart cards
IBM Systems Journal - End-to-end security
High performance annotation-aware JVM for Java cards
Proceedings of the 5th ACM international conference on Embedded software
Security analysis of smartcard to card reader communications for biometric cardholder authentication
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
The implementation of signing e-documents by using the Wireless Identity Module of cellular phones
International Journal of Mobile Communications
System level power profile analysis and optimization for smart cards and mobile devices
Proceedings of the 2008 ACM symposium on Applied computing
Solution for non-repudiation in GSM WAP applications
SEPADS'08 Proceedings of the 7th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems
Smart card based solution for non-repudiation in GSM WAP applications
WSEAS Transactions on Computers
Authentication & key agreement for off-portal mobile applications
Information Security Tech. Report
Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles
Real time security management using RFID, biometric and smart messages
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Smart card technology used in secured personal identification systems
DNCOCO'06 Proceedings of the 5th WSEAS international conference on Data networks, communications and computers
A compiler-based approach to data security
CC'05 Proceedings of the 14th international conference on Compiler Construction
A tutorial on physical security and side-channel attacks
Foundations of Security Analysis and Design III
A Password-Based User Authentication Scheme for the Integrated EPR Information System
Journal of Medical Systems
A Secure Integrated Medical Information System
Journal of Medical Systems
Hi-index | 0.00 |
From the Publisher:The boom in smart card technology reflects the medium's broad solutions potential. Embedded with a sophisticated microprocessor, smart cards offer unparalleled memory capacity and data encryption capability. From providing secure access to the Internet and mobile radio networks to performing security-sensitive financial transactions in credit card schemes, the Electronic Purse and Pay TV systems, smart card technology is now a multi-billion dollar industry. The Smart Card Handbook presents a state-of-the-art overview of the technology from fundamental information processing through design, manufacture and operation of smart card schemes. Written in a highly accessible style the Smart Card Handbook meets the needs of both novice and expert. This is an essential reference for computer and electronics engineers and students in microchip design and security system development. For professionals developing smart card products, this unique reference will provide an invaluable insight to all the facets of this sophisticated technology.