Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Smart cards --- Personal identification products industry. --- Standards.
Choose an application
Smart cards. --- Symmetric functions --- Data encryption (Computer science) --- Standards.
Choose an application
Microelectronics --- Smart cards --- Semiconductors --- Microélectronique --- Cartes à mémoire --- Semiconducteurs
Choose an application
Smart cards --- Government policy --- United States. --- Rules and practice. --- Information technology.
Choose an application
Smart Cards, Tokens, Security and Applications provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the art work is written by contributing authors who are active researchers and acknowledged experts in their field. A single book cannot be found to match both the breadth and depth of content. This book combines a cross-discipline overview of smart cards, tokens and related security and applications plus a technical reference to support further research and study. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. Smart Cards, Tokens, Security and Applications is designed for a professional audience of practitioners and researchers.
Smart cards. --- Smart cards --- Computer security. --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Data encryption (Computer science). --- Data structures (Computer scienc. --- Computer Communication Networks. --- Computer network architectures. --- Coding theory. --- Cryptology. --- Systems and Data Security. --- Data Structures and Information Theory. --- Computer Systems Organization and Communication Networks. --- Coding and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Data structures (Computer science). --- Computer communication systems. --- Computer organization. --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Organization, Computer --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Distributed processing
Choose an application
This book constitutes the refereed proceedings of the 8th International Conference on Smart Card Research and Advanced Applications, CARDIS 2008, held in London, UK, in September 2008. The 21 revised full papers presented, together with the abstract of one invited talk, were carefully reviewed and selected from 51 submissions. The papers deal with the various issues related to the use of small electronic tokens in the process of human-machine interactions. The conference scopes include numerous subfields such as networking, efficient implementations, physical security, biometrics, etc.
Smart cards --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Data encryption (Computer science). --- Electronics. --- Information Systems. --- Computer science. --- Computer Communication Networks. --- Computer security. --- Cryptology. --- Electronics and Microelectronics, Instrumentation. --- Management of Computing and Information Systems. --- Computers and Society. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Electrical engineering --- Physical sciences --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Protection --- Security measures --- Microelectronics. --- Management information systems. --- Computers and civilization. --- Computer communication systems. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Civilization and computers --- Civilization --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Microminiature electronic equipment --- Microminiaturization (Electronics) --- Electronics --- Microtechnology --- Semiconductors --- Miniature electronic equipment --- Distributed processing --- Communication systems --- Smart cards.
Choose an application
This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks, WISTP 2008, held in Seville, Spain, in May 2008. The 10 revised full papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book; they examine the rapid development of information technologies and the transition to next generation networks. The papers focus on the security of these complex and resource-constrained systems and are organized in topical sections on smart devices, network security, convergence, and cryptography.
Data protection --- Computer systems --- Smart cards --- Mobile computing --- Protection de l'information (Informatique) --- Systèmes informatiques --- Cartes à mémoire --- Informatique mobile --- Congresses. --- Access control --- Security measures --- Congrès --- Accès --- Contrôle --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- ADP systems (Computer systems) --- Computing systems --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Systems, Computer --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Distributed processing --- Information Systems. --- Cryptology. --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication
Listing 1 - 7 of 7 |
Sort by
|