Communications of the ACM
Protocol failure in the escrowed encryption standard
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Communications of the ACM
Cryptographic Design Vulnerabilities
Computer
Side Channel Cryptanalysis of Product Ciphers
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
A Practical Implementation of the Timing Attack
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Differential Fault Analysis of Secret Key Cryptosystems
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Protocol Interactions and the Chosen Protocol Attack
Proceedings of the 5th International Workshop on Security Protocols
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
On the importance of checking cryptographic protocols for faults
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Kleptography: using cryptography against cryptography
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Managing Medical and Insurance Information Through a Smart-Card-Based Information System
Journal of Medical Systems
PicoDMBS: Scaling Down Database Techniques for the Smartcard
VLDB '00 Proceedings of the 26th International Conference on Very Large Data Bases
Modelling Trust for System Design Using the i* Strategic Actors Framework
Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives
PicoDBMS: Scaling down database techniques for the smartcard
The VLDB Journal — The International Journal on Very Large Data Bases
Flexible Software Protection Using Hardware/Software Codesign Techniques
Proceedings of the conference on Design, automation and test in Europe - Volume 1
SAFE-OPS: An approach to embedded software security
ACM Transactions on Embedded Computing Systems (TECS)
A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals
IEEE Transactions on Dependable and Secure Computing
Chip-secured data access: confidential data on untrusted servers
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Chip-secured data access: reconciling access rights with data encryption
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
A Multi-Application Smart Card System with Authentic Post-Issuance Program Modification
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Approach to designing bribery-free and coercion-free electronic voting scheme
Journal of Systems and Software
Distributed double spending prevention
Proceedings of the 15th international conference on Security protocols
Using multiple smart cards for signing messages at malicious terminals
ISC'06 Proceedings of the 9th international conference on Information Security
Towards a secure and practical multifunctional smart card
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
A Password-Based User Authentication Scheme for the Integrated EPR Information System
Journal of Medical Systems
Internet card, a smart card as a true Internet node
Computer Communications
On the analysis and design of a family tree of smart card based user authentication schemes
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Hi-index | 0.00 |
Smart card systems differ from conventional computer systems in that different aspects of the system are not under a single trust boundary. The processor, I/O, data, programs, and network may be controlled by different, and hostile, parties. We discuss the security ramifications of these "splits" in trust, showing that they are fundamental to a proper understanding of the security of systems that include smart cards.