Smart Card. Research and Applications Third International Conference, CARDIS'98 Louvain-la-Neuve, Belgium, September 14-16, 1998 Proceedings /

Smart cards have been driven by the need for a secure, portable, computing platform. Hence it is no surprise that security considerations dominated their research. The CARDIS conferences were created to provide a forum for this research. CARDIS 1998 is the third international conference on Smart Car...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Quisquater, Jean-Jacques (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Schneier, Bruce (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2000.
Έκδοση:1st ed. 2000.
Σειρά:Lecture Notes in Computer Science, 1820
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 06514nam a2200625 4500
001 978-3-540-44534-0
003 DE-He213
005 20191024132337.0
007 cr nn 008mamaa
008 121227s2000 gw | s |||| 0|eng d
020 |a 9783540445340  |9 978-3-540-44534-0 
024 7 |a 10.1007/10721064  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Smart Card. Research and Applications  |h [electronic resource] :  |b Third International Conference, CARDIS'98 Louvain-la-Neuve, Belgium, September 14-16, 1998 Proceedings /  |c edited by Jean-Jacques Quisquater, Bruce Schneier. 
250 |a 1st ed. 2000. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2000. 
300 |a XI, 379 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1820 
505 0 |a Session 1: Electronic Money and Commerce -- User-Defined Divisibility of Ecash and a Practical Implementation -- An Operational Model of QuickPay -- Interoperable and Untraceable Debit-Tokens for Electronic Fee Collection -- The Banksys Signature Transport (BST) Protocol -- Session 2: The Java Card I -- The OpenCard Framework -- Smartcards - From Security Tokens to Intelligent Adjuncts -- Formal Proof of Smart Card Applets Correctness -- Session 3: The Java Card II -- Smart Card Payment over Internet with Privacy Protection -- Developing Smart Card-Based Applications Using Java Card -- The Performance of Modern Block Ciphers in JAVA -- Recoverable Persistent Memory for SmartCard -- Session 4: Attacks and Dealing with Speci c Threats -- Pirate Card Rejection -- Secure Authentication with Multiple Parallel Keys -- Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures -- A Practical Implementation of the Timing Attack -- Session 5: Authentication -- Techniques for Low Cost Authentication and Message Authentication -- Enhancing SESAMEV4 with Smart Cards -- How to Say "YES" with Smart Cards -- Session 6: Cryptography and Applications -- An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms -- Efficient Smart-Card Based Anonymous Fingerprinting -- Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol -- The Block Cipher BKSQ -- Session 7: Advanced Encryption Standard -- Serpent and Smartcards -- Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Cards Applications -- Twofish on Smart Cards -- The Block Cipher Rijndael -- Session 8: Architectures and Designs -- Secure Log File Download Mechanisms for Smart Cards -- The Vault, an Architecture for Smartcards to Gain Infinite Memory -- A Data Driven Model for Designing Applications with Smart Cards -- Secure Personalization Using Proxy Cryptography -- Session 9: E cient Implementations I -- Recent Results on Modular Multiplications for Smart Cards -- RSA Signature Algorithm for Microcontroller Implementation -- Session 10: E cient Implementations II -- Efficient Ways to Implement Elliptic Curve Exponentiation on a Smart Card -- Reducing the Collision Probability of Alleged Comp128 -- Smart Card Crypto-Coprocessors for Public-Key Cryptography. 
520 |a Smart cards have been driven by the need for a secure, portable, computing platform. Hence it is no surprise that security considerations dominated their research. The CARDIS conferences were created to provide a forum for this research. CARDIS 1998 is the third international conference on Smart Card Research and Advanced Applications, held in Louvain-la-Neuve, Belgium, 14-16 Sept- ber 1998. The ?rst CARDIS was held in Lille, France in November 1994, and the second was held in Amsterdam, The Netherlands in September 1996. The fourth CARDIS is scheduled to take place in Bristol, UK in September 2000 (http://www.cardis.org). This volume contains the refereed papers presented at CARDIS 1998. These 35 papers were ?rst published in a pre-proceedings and distributed to the - tendees at the conference; they have subsequently been revised and updated for this volume. The papers discuss all aspects of smart-card research: Java cards, elect- nic commerce applications, e?ciency, security (including cryptographic al- rithms, cryptographic protocols, and authentication), and architecture. Subm- sions from Europe, the U.S., Asia, and Australia show that this is indeed an international area of research, and one that is becoming more popular as pr- tical demand for smart cards increase. We wish to thank the Program Committee members who did an excellent job in reviewing papers and providing feedback to the authors. 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science). 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Computers and civilization. 
650 0 |a Computer communication systems. 
650 0 |a Operating systems (Computers). 
650 1 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Cryptology.  |0 http://scigraph.springernature.com/things/product-market-codes/I28020 
650 2 4 |a Management of Computing and Information Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I24067 
650 2 4 |a Computers and Society.  |0 http://scigraph.springernature.com/things/product-market-codes/I24040 
650 2 4 |a Computer Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
650 2 4 |a Operating Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I14045 
700 1 |a Quisquater, Jean-Jacques.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Schneier, Bruce.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783662172612 
776 0 8 |i Printed edition:  |z 9783540679233 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1820 
856 4 0 |u https://doi.org/10.1007/10721064  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)