000 | 05790nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-3-540-44534-0 | ||
003 | DE-He213 | ||
005 | 20160624101949.0 | ||
007 | cr nn 008mamaa | ||
008 | 121227s2000 gw | s |||| 0|eng d | ||
020 |
_a9783540445340 _9978-3-540-44534-0 |
||
024 | 7 |
_a10.1007/10721064 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.82 _223 |
245 | 1 | 0 |
_aSmart Card Research and Applications _h[electronic resource] : _bThird International Conference, CARDIS’98, Louvain-la-Neuve, Belgium, September 14-16, 1998. Proceedings / _cedited by Jean-Jacques Quisquater, Bruce Schneier. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2000. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2000. |
|
300 |
_aXI, 379 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v1820 |
|
505 | 0 | _aSession 1: Electronic Money and Commerce -- User-Defined Divisibility of Ecash and a Practical Implementation -- An Operational Model of QuickPay -- Interoperable and Untraceable Debit-Tokens for Electronic Fee Collection -- The Banksys Signature Transport (BST) Protocol -- Session 2: The Java Card I -- The OpenCard Framework -- Smartcards – From Security Tokens to Intelligent Adjuncts -- Formal Proof of Smart Card Applets Correctness -- Session 3: The Java Card II -- Smart Card Payment over Internet with Privacy Protection -- Developing Smart Card-Based Applications Using Java Card -- The Performance of Modern Block Ciphers in JAVA -- Recoverable Persistent Memory for SmartCard -- Session 4: Attacks and Dealing with Speci c Threats -- Pirate Card Rejection -- Secure Authentication with Multiple Parallel Keys -- Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures -- A Practical Implementation of the Timing Attack -- Session 5: Authentication -- Techniques for Low Cost Authentication and Message Authentication -- Enhancing SESAMEV4 with Smart Cards -- How to Say “YES” with Smart Cards -- Session 6: Cryptography and Applications -- An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms -- Efficient Smart-Card Based Anonymous Fingerprinting -- Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol -- The Block Cipher BKSQ -- Session 7: Advanced Encryption Standard -- Serpent and Smartcards -- Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Cards Applications -- Twofish on Smart Cards -- The Block Cipher Rijndael -- Session 8: Architectures and Designs -- Secure Log File Download Mechanisms for Smart Cards -- The Vault, an Architecture for Smartcards to Gain Infinite Memory -- A Data Driven Model for Designing Applications with Smart Cards -- Secure Personalization Using Proxy Cryptography -- Session 9: E cient Implementations I -- Recent Results on Modular Multiplications for Smart Cards -- RSA Signature Algorithm for Microcontroller Implementation -- Session 10: E cient Implementations II -- Efficient Ways to Implement Elliptic Curve Exponentiation on a Smart Card -- Reducing the Collision Probability of Alleged Comp128 -- Smart Card Crypto-Coprocessors for Public-Key Cryptography. | |
520 | _aSmart cards have been driven by the need for a secure, portable, computing platform. Hence it is no surprise that security considerations dominated their research. The CARDIS conferences were created to provide a forum for this research. CARDIS 1998 is the third international conference on Smart Card Research and Advanced Applications, held in Louvain-la-Neuve, Belgium, 14-16 Sept- ber 1998. The ?rst CARDIS was held in Lille, France in November 1994, and the second was held in Amsterdam, The Netherlands in September 1996. The fourth CARDIS is scheduled to take place in Bristol, UK in September 2000 (http://www.cardis.org). This volume contains the refereed papers presented at CARDIS 1998. These 35 papers were ?rst published in a pre-proceedings and distributed to the - tendees at the conference; they have subsequently been revised and updated for this volume. The papers discuss all aspects of smart-card research: Java cards, elect- nic commerce applications, e?ciency, security (including cryptographic al- rithms, cryptographic protocols, and authentication), and architecture. Subm- sions from Europe, the U.S., Asia, and Australia show that this is indeed an international area of research, and one that is becoming more popular as pr- tical demand for smart cards increase. We wish to thank the Program Committee members who did an excellent job in reviewing papers and providing feedback to the authors. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aInformation Systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aOperating Systems. |
700 | 1 |
_aQuisquater, Jean-Jacques. _eeditor. |
|
700 | 1 |
_aSchneier, Bruce. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783540679233 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v1820 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/10721064 |
942 |
_2EBK4882 _cEBK |
||
999 |
_c34176 _d34176 |