Smart Card. Research and Applications Third International Conference, CARDIS'98 Louvain-la-Neuve, Belgium, September 14-16, 1998 Proceedings /
Smart cards have been driven by the need for a secure, portable, computing platform. Hence it is no surprise that security considerations dominated their research. The CARDIS conferences were created to provide a forum for this research. CARDIS 1998 is the third international conference on Smart Car...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2000.
|
Έκδοση: | 1st ed. 2000. |
Σειρά: | Lecture Notes in Computer Science,
1820 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Session 1: Electronic Money and Commerce
- User-Defined Divisibility of Ecash and a Practical Implementation
- An Operational Model of QuickPay
- Interoperable and Untraceable Debit-Tokens for Electronic Fee Collection
- The Banksys Signature Transport (BST) Protocol
- Session 2: The Java Card I
- The OpenCard Framework
- Smartcards - From Security Tokens to Intelligent Adjuncts
- Formal Proof of Smart Card Applets Correctness
- Session 3: The Java Card II
- Smart Card Payment over Internet with Privacy Protection
- Developing Smart Card-Based Applications Using Java Card
- The Performance of Modern Block Ciphers in JAVA
- Recoverable Persistent Memory for SmartCard
- Session 4: Attacks and Dealing with Speci c Threats
- Pirate Card Rejection
- Secure Authentication with Multiple Parallel Keys
- Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures
- A Practical Implementation of the Timing Attack
- Session 5: Authentication
- Techniques for Low Cost Authentication and Message Authentication
- Enhancing SESAMEV4 with Smart Cards
- How to Say "YES" with Smart Cards
- Session 6: Cryptography and Applications
- An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms
- Efficient Smart-Card Based Anonymous Fingerprinting
- Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol
- The Block Cipher BKSQ
- Session 7: Advanced Encryption Standard
- Serpent and Smartcards
- Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Cards Applications
- Twofish on Smart Cards
- The Block Cipher Rijndael
- Session 8: Architectures and Designs
- Secure Log File Download Mechanisms for Smart Cards
- The Vault, an Architecture for Smartcards to Gain Infinite Memory
- A Data Driven Model for Designing Applications with Smart Cards
- Secure Personalization Using Proxy Cryptography
- Session 9: E cient Implementations I
- Recent Results on Modular Multiplications for Smart Cards
- RSA Signature Algorithm for Microcontroller Implementation
- Session 10: E cient Implementations II
- Efficient Ways to Implement Elliptic Curve Exponentiation on a Smart Card
- Reducing the Collision Probability of Alleged Comp128
- Smart Card Crypto-Coprocessors for Public-Key Cryptography.