Listing 1 - 10 of 28 | << page >> |
Sort by
|
Choose an application
Annotation.
Smart cards - Security measures. --- Smart cards --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Electrical Engineering --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Security measures --- Security measures.
Choose an application
Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu
Smart cards --- Security measures. --- Access control. --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication
Choose an application
This book constitutes the proceedings of the 21st International Conference on Smart Card Research and Advanced Applications, CARDIS 2022, which took place in November 2022. The conference took place in Birmingham, United Kingdom. The 15 full papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections named: physical attacks; physical countermeasures; protecting AES; evaluation methodologies; attacking NTRU; next-generation cryptography.
Miniature electronic equipment --- Smart cards --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication
Choose an application
Smart cards --- Smart card industry --- Cartes à mémoire --- Smart card industry. --- Smart cards. --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Computer storage device industry --- Industries --- Industrie --- Cartes à mémoire
Choose an application
Miniature electronic equipment --- Smart cards. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Targetes intel·ligents --- Xifratge (Informàtica) --- Seguretat informàtica
Choose an application
This book provides the readers with an interdisciplinary perspective on communication in the diffuse boundaries that also demonstrates the diversity and inclusion for presenting wide range and rapid changes in contents, and the authors use “smart” as the guiding principle while indicate “communication” has been defined as a core feature. Appropriately, the book is divided into eight major sections. As always, the inevitable result of upgrading and constant iterations of developing new communication technology, the media communication has turned out to be one of the most important means in the smart era. The book sheds new light on virtual reality (VR), a pioneering technology in smart media communication, as an entry point to explore why the core social networks of smart news and smart media communication could occupy the central position in smart media communication while to discuss issues such as platform society built using smart media communication, and further elaborate on the integration of 5G technology, media and social transformation. This book not merely covers disciplines such as journalism and communication, but also on the universal application of smart media communication, and furthermore, it provides practical guidance and reviews cutting-edge ideas. It serves as a good future reference to help scholars, graduate students as well as relevant professionals for thinking outside the box that in order to continually expand reader’s knowledge and professional capabilities, especially aware of the impact of observation and judgment, value analysis and lifelong learning. .
Sociology of knowledge --- Engineering sciences. Technology --- Mass communications --- communicatie --- technologie --- Communication. --- Technology --- Smart cards. --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Communication, Primitive --- Mass communication --- Sociology --- Sociology of technology --- Sociological aspects.
Choose an application
This book constitutes the proceedings of the 22nd International Conference on Smart Card Research and Advanced Applications, CARDIS 2023, held in Amsterdam, The Netherlands, during November 14–16, 2023. The 13 full papers presented in this volume were carefully reviewed and selected from 28 submissions. They were organized in topical sections as follows: fault attacks; side-channel analysis; smartcards & efficient Implementations; and side-channel & neural networks.
Cryptography. --- Data encryption (Computer science). --- Computer networks. --- Computer systems. --- Coding theory. --- Information theory. --- Computer networks --- Computer science --- Cryptology. --- Computer Communication Networks. --- Computer System Implementation. --- Coding and Information Theory. --- Mobile and Network Security. --- Mathematics of Computing. --- Security measures. --- Mathematics. --- Miniature electronic equipment --- Smart cards
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Smart Card Research and Advanced Applications, CARDIS 2018, held in Monpellier, France, in November 2018. The 13 revised full papers presented in this book were carefully reviewed and selected from 28 submissions. CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications.
Data encryption (Computer science). --- Computer security. --- Cryptology. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Protection --- Security measures --- Smart cards. --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication
Choose an application
Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance. Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis as well as advanced techniques like template attacks. Furthermore, this volume provides an extensive discussion of countermeasures like shuffling, masking, and DPA-resistant logic styles. By analyzing the pros and cons of the different countermeasures, Power Analysis Attacks: Revealing the Secrets of Smart Cards allows practitioners to decide how to protect smart cards. This book also provides valuable information for graduate and advanced undergraduate students, and researchers working in information security. .
Smart cards --- Cartes à mémoire --- Security measures. --- Sécurité --- Mesures --- 681.3*D46 --- 681.188 --- beveiligingsystemen --- computerbeveiliging --- smart cards --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Cryptographic devices. Ciphering, encoding machines. Deciphering, decoding machines --- cryptografische inrichtingen, ontcijferingsmachines --- Smart cards -- Security measures. --- Computer Science --- Electrical Engineering --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Security measures --- 681.188 Cryptographic devices. Ciphering, encoding machines. Deciphering, decoding machines --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Cartes à mémoire --- Sécurité --- EPUB-LIV-FT LIVINFOR SPRINGER-B --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer engineering. --- Electrical engineering. --- Computer Science. --- Systems and Data Security. --- Communications Engineering, Networks. --- Computer Engineering. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Computer Communication Networks. --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Telecommunication. --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data encryption (Computer science)
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017, held in Lugano, Switzerland, in November 2017. The 14 revised full papers presented together with 2 abstracts of invited talks in this book were carefully reviewed and selected from 48 submissions. CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Cryptology. --- Smart cards --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Data encryption (Computer science)
Listing 1 - 10 of 28 | << page >> |
Sort by
|