Listing 1 - 7 of 7
Sort by

Periodical
Card technology today.
ISSN: 18736521 09652590 Year: 2009 Publisher: Amsterdam ; New York : Elsevier Science,


Book
Smart Card Research and Advanced Applications : 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers
Authors: ---
ISBN: 9783319167633 3319167626 9783319167626 3319167634 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014. The 15 revised full papers presented in this book were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on Java cards; software countermeasures; side-channel analysis; embedded implementations; public-key cryptography; and leakage and fault attacks.

Smart card research and advanced applications : 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006 : proceedings
Authors: --- --- --- ---
ISBN: 9783540333111 3540333118 3540333126 Year: 2006 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT Security, which often appear sc- tered and only loosely connected. Smart card research unites them by providing a common goal: advancing the state of the art of designing and deploying small tokens to increase the security in Information Technology. CARDIS has a tradition of more than one decade, and has established itself asthepremier conferencefor researchresultsinsmartcardtechnology.As smart card research is unique, so is CARDIS; the conference successfully attracts a- demic and industrial researchers without compromising in either way. CARDIS accommodates applied research results as well as theoretical contributions that might or might not become practically relevant. The key to making such a m- ture attractive to both academia and industry is simple: quality of contributions and relevance to the overall subject. This year’s CARDIS made it easy to continue this tradition: we received 76 papers, nearly all of them relevant to the focus of CARDIS and presenting high-quality researchresults. The ProgramCommittee workedhard on selecting the best 25 papers to be presented at the conference. We are very grateful to the members of the Program Committee and the additional referees for generously spending their time on the di?cult task of assessing the value of submitted papers. Daniel Schreckling provided invaluable assistance in handling submissions, managing review reports and editing the proceedings. The assistance of Jordi Castell` a in handling practical aspects of the conference preparation is also greatly appreciated.

Keywords

Smart cards --- Cartes à mémoire --- Congresses. --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer Communication Networks. --- Operating Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Operating systems --- Distributed processing --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Information Systems. --- Cryptology.

Construction and analysis of safe, secure, and interoperable smart devices : International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004 : revised selected papers
Authors: ---
ISBN: 9783540242871 3540242872 3540305696 Year: 2005 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer storage devices --- Computer security --- Smart cards --- Data transmission systems --- Ordinateurs --- Sécurité informatique --- Cartes à mémoire --- Données --- Congresses --- Congresses. --- Security measures --- Mémoires --- Congrès --- Sécurité --- Mesures --- Transmissions --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Electrical Engineering --- Information Technology --- Software Engineering --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Data communication systems --- Transmission of data --- Computer science. --- Special purpose computers. --- Computer programming. --- Software engineering. --- Programming languages (Electronic computers). --- Operating systems (Computers). --- Data encryption (Computer science). --- Computer Science. --- Data Encryption. --- Software Engineering. --- Special Purpose and Application-Based Systems. --- Programming Techniques. --- Programming Languages, Compilers, Interpreters. --- Operating Systems. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Electronic data processing --- Languages, Artificial --- Computer software engineering --- Engineering --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Special purpose computers --- Informatics --- Science --- Operating systems --- Programming --- Expansion boards (Microcomputers) --- Near-field communication --- Digital communications --- Electronic systems --- Information theory --- Telecommunication systems --- Cryptology.

Information security theory and practices : smart cards, mobile and ubiquitous computing systems : First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, proceedings
Authors: --- --- ---
ISBN: 9783540723530 3540723536 3540723544 Year: 2007 Publisher: Berlin ; Heidelberg ; New York : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in Information - curity Theory and Practices (WISTP) to consider the problem as a whole. In additiontheworkshopaimsto bringtogetherresearchersandpractitionersin- lated disciplines and encourage interchange and practical co-operation between academia and industry. Although this is the ?rst ever WISTP event, the response from researchers wassuperbwithover68paperssubmittedforpotentialinclusionintheworkshop and proceedings. The submissions were reviewed by at least three reviewers, in most cases by four, and for program committee (PC) papers at least ?ve reviewers. This long and rigorous process was only possible thanks to the hard work of the PC members and additional reviewers, listed in the following pages. We would like to express our gratitude to the PC members, who were very supportive from the very beginning of this project. Thanks are also due to the additional expert reviewers who helped the PC to select the ?nal 20 workshop papers for publication in the proceedings. Of course we highly appreciate the e?orts of all the authors who submitted papers to WISTP 2007. We hope they will contribute again to a future edition and encourage others to do so.

Keywords

Data protection --- Computer systems --- Smart cards --- Mobile computing --- Ubiquitous computing --- Protection de l'information (Informatique) --- Systèmes informatiques --- Cartes à mémoire --- Informatique mobile --- Informatique omniprésente --- Congresses. --- Access control --- Security measures --- Congrès --- Accès --- Contrôle --- Sécurité --- Mesures --- Computer systems -- Access control -- Congresses. --- Data protection -- Congresses. --- Mobile computing -- Security measures -- Congresses. --- Smart cards -- Congresses. --- Ubiquitous computing -- Security measures -- Congresses. --- Computer Science --- Engineering & Applied Sciences --- Information Technology --- Computer Science (Hardware & Networks) --- Pervasive computing --- UbiComp (Computer science) --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Computers and Society. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Protection --- Distributed processing --- Communication systems --- Embedded computer systems --- Context-aware computing --- Portable computers --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Information Systems. --- Cryptology.

Information security theory and practices, smart devices, convergence and next generation networks : second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 : proceedings
Authors: --- ---
ISBN: 9783540799658 3540799656 3540799664 Year: 2008 Publisher: Berlin, Germany ; New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks, WISTP 2008, held in Seville, Spain, in May 2008. The 10 revised full papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book; they examine the rapid development of information technologies and the transition to next generation networks. The papers focus on the security of these complex and resource-constrained systems and are organized in topical sections on smart devices, network security, convergence, and cryptography.

Keywords

Data protection --- Computer systems --- Smart cards --- Mobile computing --- Protection de l'information (Informatique) --- Systèmes informatiques --- Cartes à mémoire --- Informatique mobile --- Congresses. --- Access control --- Security measures --- Congrès --- Accès --- Contrôle --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- ADP systems (Computer systems) --- Computing systems --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Systems, Computer --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Distributed processing --- Information Systems. --- Cryptology. --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication

Power Analysis Attacks : Revealing the Secrets of Smart Cards
Authors: --- ---
ISBN: 9780387308579 0387308571 9786611167462 1281167460 0387381627 Year: 2007 Publisher: Boston, MA : Springer US,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance. Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis as well as advanced techniques like template attacks. Furthermore, this volume provides an extensive discussion of countermeasures like shuffling, masking, and DPA-resistant logic styles. By analyzing the pros and cons of the different countermeasures, Power Analysis Attacks: Revealing the Secrets of Smart Cards allows practitioners to decide how to protect smart cards. This book also provides valuable information for graduate and advanced undergraduate students, and researchers working in information security. .

Keywords

Smart cards --- Cartes à mémoire --- Security measures. --- Sécurité --- Mesures --- 681.3*D46 --- 681.188 --- beveiligingsystemen --- computerbeveiliging --- smart cards --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Cryptographic devices. Ciphering, encoding machines. Deciphering, decoding machines --- cryptografische inrichtingen, ontcijferingsmachines --- Smart cards -- Security measures. --- Computer Science --- Electrical Engineering --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Security measures --- 681.188 Cryptographic devices. Ciphering, encoding machines. Deciphering, decoding machines --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Cartes à mémoire --- Sécurité --- EPUB-LIV-FT LIVINFOR SPRINGER-B --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer engineering. --- Electrical engineering. --- Computer Science. --- Systems and Data Security. --- Communications Engineering, Networks. --- Computer Engineering. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Computer Communication Networks. --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Telecommunication. --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data encryption (Computer science)

Listing 1 - 7 of 7
Sort by