Narrow your search

Library

KU Leuven (6)

ULB (4)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

UCLL (3)

ULiège (3)

VDIC (3)

VIVES (3)

UGent (1)


Resource type

book (7)


Language

English (6)

French (1)


Year
From To Submit

2008 (7)

Listing 1 - 7 of 7
Sort by

Book
Guidelines for the accreditation of personal identity verification card issuers
Authors: ---
Year: 2008 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Symmetric key injection onto smart cards
Authors: --- ---
Year: 2008 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Technologie microélectronique : du silicium aux circuits intégrés
Author:
ISBN: 9782729838669 272983866X Year: 2008 Publisher: Paris : Ellipses,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
DOD business systems modernization : planned investment in Navy program to create cashless shipboard environment needs to be justified and better managed : report to the Subcommittee on Readiness and Management Support, Committee on Armed Services, U.S. Senate.
Author:
Year: 2008 Publisher: [Washington, D.C.] : U.S. Govt. Accountability Office,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Smart cards, tokens, security and applications
Authors: ---
ISBN: 1281139548 9786611139544 160119949X 0387721983 0387721975 1441944265 Year: 2008 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Smart Cards, Tokens, Security and Applications provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the art work is written by contributing authors who are active researchers and acknowledged experts in their field. A single book cannot be found to match both the breadth and depth of content. This book combines a cross-discipline overview of smart cards, tokens and related security and applications plus a technical reference to support further research and study. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. Smart Cards, Tokens, Security and Applications is designed for a professional audience of practitioners and researchers.

Keywords

Smart cards. --- Smart cards --- Computer security. --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Data encryption (Computer science). --- Data structures (Computer scienc. --- Computer Communication Networks. --- Computer network architectures. --- Coding theory. --- Cryptology. --- Systems and Data Security. --- Data Structures and Information Theory. --- Computer Systems Organization and Communication Networks. --- Coding and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Data structures (Computer science). --- Computer communication systems. --- Computer organization. --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Organization, Computer --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Distributed processing


Book
Smart card research and advanced applications : 8th IFIP WG 8.8/11.2 international conference, CARDIS 2008, London, UK, September 8-11, 2008 ; proceedings
Authors: --- --- ---
ISBN: 3540858938 354085892X Year: 2008 Publisher: Berlin, Germany ; New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 8th International Conference on Smart Card Research and Advanced Applications, CARDIS 2008, held in London, UK, in September 2008. The 21 revised full papers presented, together with the abstract of one invited talk, were carefully reviewed and selected from 51 submissions. The papers deal with the various issues related to the use of small electronic tokens in the process of human-machine interactions. The conference scopes include numerous subfields such as networking, efficient implementations, physical security, biometrics, etc.

Keywords

Smart cards --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Data encryption (Computer science). --- Electronics. --- Information Systems. --- Computer science. --- Computer Communication Networks. --- Computer security. --- Cryptology. --- Electronics and Microelectronics, Instrumentation. --- Management of Computing and Information Systems. --- Computers and Society. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Electrical engineering --- Physical sciences --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Protection --- Security measures --- Microelectronics. --- Management information systems. --- Computers and civilization. --- Computer communication systems. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Civilization and computers --- Civilization --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Microminiature electronic equipment --- Microminiaturization (Electronics) --- Electronics --- Microtechnology --- Semiconductors --- Miniature electronic equipment --- Distributed processing --- Communication systems --- Smart cards.

Information security theory and practices, smart devices, convergence and next generation networks : second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 : proceedings
Authors: --- ---
ISBN: 9783540799658 3540799656 3540799664 Year: 2008 Publisher: Berlin, Germany ; New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks, WISTP 2008, held in Seville, Spain, in May 2008. The 10 revised full papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book; they examine the rapid development of information technologies and the transition to next generation networks. The papers focus on the security of these complex and resource-constrained systems and are organized in topical sections on smart devices, network security, convergence, and cryptography.

Keywords

Data protection --- Computer systems --- Smart cards --- Mobile computing --- Protection de l'information (Informatique) --- Systèmes informatiques --- Cartes à mémoire --- Informatique mobile --- Congresses. --- Access control --- Security measures --- Congrès --- Accès --- Contrôle --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- ADP systems (Computer systems) --- Computing systems --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Systems, Computer --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Distributed processing --- Information Systems. --- Cryptology. --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication

Listing 1 - 7 of 7
Sort by