Countermeasures for attacks on satellite TV cards using open receivers
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals
IEEE Transactions on Dependable and Secure Computing
Developing Java Card Applications with B
Electronic Notes in Theoretical Computer Science (ENTCS)
Digital design of a cryptographic card (LAM) embedded smart card reader
ICCOMP'07 Proceedings of the 11th WSEAS International Conference on Computers
Offline count-limited certificates
Proceedings of the 2008 ACM symposium on Applied computing
Secure mobile electronic card used in medical services
ACC'08 Proceedings of the WSEAS International Conference on Applied Computing Conference
RFID digital pheromones for generating stigmergic behaviour to autonomous mobile robots
CONTROL'08 Proceedings of the 4th WSEAS/IASME international conference on Dynamical systems and control
Proceedings of the 46th Annual Southeast Regional Conference on XX
Efficient execution of application applets based on persistent object caching in Java card system
Proceedings of the 2009 International Conference on Hybrid Information Technology
The study on the user authentication protocol in GSM
Proceedings of the 2009 International Conference on Hybrid Information Technology
Application Management Framework in User Centric Smart Card Ownership Model
Information Security Applications
Enforcing access restrictions on terminal maintenance tasks using smart cards
SoftCOM'09 Proceedings of the 17th international conference on Software, Telecommunications and Computer Networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Strong authentication over lock-keeper
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
Efficient an implementation method research of a smart card atomic operation
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Attack model for verification of interval security properties for smart card C codes
PLAS '10 Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security
A virtual development environment for smart card applications
ACMOS'10 Proceedings of the 12th WSEAS international conference on Automatic control, modelling & simulation
Securing embedded programmable gate arrays in secure circuits
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
A new approach for a healthcare network architecture and security
MMACTEE'09 Proceedings of the 11th WSEAS international conference on Mathematical methods and computational techniques in electrical engineering
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Design, installation and execution of a security agent for mobile stations
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
The research on how to reduce the number of EEPROM writing to improve speed of java card
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A high performance buffering of java objects for java card systems with flash memory
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
An efficient and practical fingerprint-based remote user authentication scheme with smart cards
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Unique user-generated digital pseudonyms
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Detecting trapdoors in smart cards using timing and power analysis
TestCom'05 Proceedings of the 17th IFIP TC6/WG 6.1 international conference on Testing of Communicating Systems
Implementing a high-assurance smart-card OS
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
The mondex challenge: machine checked proofs for an electronic purse
FM'06 Proceedings of the 14th international conference on Formal Methods
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Efficient reuse of domain-specific test knowledge: an industrial case in the smart card domain
Proceedings of the 34th International Conference on Software Engineering
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
A snapshot of trusted personal devices applicable to transaction processing
Personal and Ubiquitous Computing
Weakening epassports through bad implementations
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Provably secure three-party authenticated key agreement protocol using smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
From the Publisher:The boom in smart card technology reflects the medium's broad solutions potential. Embedded with a sophisticated microprocessor, smart cards offer unparalleled memory capacity and data encryption capability. From providing secure access to the Internet and mobile radio networks to performing security-sensitive financial transactions in credit card schemes, the Electronic Purse and Pay TV systems, smart card technology is now a multi-billion dollar industry. The Smart Card Handbook presents a state-of-the-art overview of the technology from fundamental information processing through design, manufacture and operation of smart card schemes. Written in a highly accessible style the Smart Card Handbook meets the needs of both novice and expert. This is an essential reference for computer and electronics engineers and students in microchip design and security system development. For professionals developing smart card products, this unique reference will provide an invaluable insight to all the facets of this sophisticated technology.