Smart Card. Research and Applications Third International Conference, CARDIS'98 Louvain-la-Neuve, Belgium, September 14-16, 1998 Proceedings /

Smart cards have been driven by the need for a secure, portable, computing platform. Hence it is no surprise that security considerations dominated their research. The CARDIS conferences were created to provide a forum for this research. CARDIS 1998 is the third international conference on Smart Car...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Quisquater, Jean-Jacques (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Schneier, Bruce (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2000.
Έκδοση:1st ed. 2000.
Σειρά:Lecture Notes in Computer Science, 1820
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Session 1: Electronic Money and Commerce
  • User-Defined Divisibility of Ecash and a Practical Implementation
  • An Operational Model of QuickPay
  • Interoperable and Untraceable Debit-Tokens for Electronic Fee Collection
  • The Banksys Signature Transport (BST) Protocol
  • Session 2: The Java Card I
  • The OpenCard Framework
  • Smartcards - From Security Tokens to Intelligent Adjuncts
  • Formal Proof of Smart Card Applets Correctness
  • Session 3: The Java Card II
  • Smart Card Payment over Internet with Privacy Protection
  • Developing Smart Card-Based Applications Using Java Card
  • The Performance of Modern Block Ciphers in JAVA
  • Recoverable Persistent Memory for SmartCard
  • Session 4: Attacks and Dealing with Speci c Threats
  • Pirate Card Rejection
  • Secure Authentication with Multiple Parallel Keys
  • Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures
  • A Practical Implementation of the Timing Attack
  • Session 5: Authentication
  • Techniques for Low Cost Authentication and Message Authentication
  • Enhancing SESAMEV4 with Smart Cards
  • How to Say "YES" with Smart Cards
  • Session 6: Cryptography and Applications
  • An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms
  • Efficient Smart-Card Based Anonymous Fingerprinting
  • Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol
  • The Block Cipher BKSQ
  • Session 7: Advanced Encryption Standard
  • Serpent and Smartcards
  • Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Cards Applications
  • Twofish on Smart Cards
  • The Block Cipher Rijndael
  • Session 8: Architectures and Designs
  • Secure Log File Download Mechanisms for Smart Cards
  • The Vault, an Architecture for Smartcards to Gain Infinite Memory
  • A Data Driven Model for Designing Applications with Smart Cards
  • Secure Personalization Using Proxy Cryptography
  • Session 9: E cient Implementations I
  • Recent Results on Modular Multiplications for Smart Cards
  • RSA Signature Algorithm for Microcontroller Implementation
  • Session 10: E cient Implementations II
  • Efficient Ways to Implement Elliptic Curve Exponentiation on a Smart Card
  • Reducing the Collision Probability of Alleged Comp128
  • Smart Card Crypto-Coprocessors for Public-Key Cryptography.