Smart Card Research and Advanced Applications
Springer Berlin (Verlag)
978-3-540-85892-8 (ISBN)
Malicious Code on Java Card Smartcards: Attacks and Countermeasures.- Static Program Analysis for Java Card Applets.- On Practical Information Flow Policies for Java-Enabled Multiapplication Smart Cards.- New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough.- DSA Signature Scheme Immune to the Fault Cryptanalysis.- A Black Hen Lays White Eggs.- Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents.- Fast Hash-Based Signatures on Constrained Devices.- Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence.- The Trusted Execution Module: Commodity General-Purpose Trusted Computing.- Management of Multiple Cards in NFC-Devices.- Coupon Recalculation for the GPS Authentication Scheme.- Provably Secure Grouping-Proofs for RFID Tags.- Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices.- A Practical DPA Countermeasure with BDD Architecture.- SCARE of an Unknown Hardware Feistel Implementation.- Evaluation of Java Card Performance.- Application of Network Smart Cards to Citizens Identification Systems.- SmartPro: A Smart Card Based Digital Content Protection for Professional Workflow.- A Practical Attack on the MIFARE Classic.- A Chemical Memory Snapshot.- Recent Advances in Electronic Cash Design.
Erscheint lt. Verlag | 25.8.2008 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 295 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 475 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | authentication • Benchmark • Communication Security • Cryptanalysis • cryptographic protocols • Cryptology • Digital Signatures • Efficient Implementation • Embedded Security • Hardcover, Softcover / Informatik, EDV/Informatik • hash based cryptography • HC/Informatik, EDV/Informatik • IFIP • Information Security • java cards • Network Security • Performance • Physical Security • RFID security • rsa • security • side-channel attacks • smart card networking • Smart cards • static program analysis • temporal safety • Trust |
ISBN-10 | 3-540-85892-X / 354085892X |
ISBN-13 | 978-3-540-85892-8 / 9783540858928 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich