FEEDBACK Smiley face
Smart Card Programming and Security International Conference on Research in Smart Cards, E-smart 2001 Cannes, France, September 19–21, 2001 Proceedings / [electronic resource] : edited by Isabelle Attali, Thomas Jensen. - VIII, 260 p. online resource. - Lecture Notes in Computer Science, 2140 0302-9743 ; . - Lecture Notes in Computer Science, 2140 .

Invited Talk -- Protecting Consumer Security Devices -- Contributed Papers -- Jakarta: A Toolset for Reasoning about JavaCard -- Mechanising a Protocol for Smart Cards -- JCCM: Flexible Certificates for smartcards with Java Card -- Context Inference for Static Analysis of Java Card Object Sharing -- Automated Test and Oracle Generation for Smart-Card Applications -- An Internet Authorization Scheme Using Smart-Card-Based Security Kernels -- Turning Multi-applications Smart Cards Services Available from Anywhere at Anytime: A SOAP/MOM Approach in the Context of Java Cards -- An Operational Semantics of the Java Card Firewall -- CardS4: Modal Theorem Proving on Java Smartcards -- iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric -- SIMspeak - Towards an Open and Secure Application Platform for GSM SIMs -- On-Card Bytecode Verification for Java Card -- Towards a Full Formal Specification of the JavaCard API -- Protection Profiles and Generic Security Targets for Smart Cards as Secure Signature Creation Devices-Existing Solutions for the Payment Sector -- A Flexible Invocation Framework for Java Card -- ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards -- Information Leakage Attacks against Smart Card Implementations of the Elliptic Curve Digital Signature Algorithm -- Use of Biometrics for User Verification in Electronic Signature Smartcards -- Programming Internet Smartcard with XML Scripts -- Public-Key-Based High-Speed Payment (Electronic Money) System Using Contact-Less Smart Cards.

9783540454182

10.1007/3-540-45418-7 doi


Computer science.
Computer communication systems.
Special purpose computers.
Operating systems (Computers).
Computer security.
Data encryption (Computer science).
Computer engineering.
Computer Science.
Data Encryption.
Computer Engineering.
Systems and Data Security.
Special Purpose and Application-Based Systems.
Computer Communication Networks.
Operating Systems.

QA76.9.A25

005.82

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in