Smart Card. Research and Applications: Third International Conference, Cardis'98 Louvain-LA-Neuve, Belgium, September 14-16, 1998 ProceedingsPaperback Lecture Notes in Computer Science
Free delivery worldwide
Dispatched in 3 business days
When will my order arrive?
- Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
- Format: Paperback | 379 pages
- Dimensions: 156mm x 239mm x 24mm | 652g
- Publication date: 1 October 2000
- Publication City/Country: Berlin
- ISBN 10: 3540679235
- ISBN 13: 9783540679233
- Edition statement: 2000 ed.
- Illustrations note: biography
Smart cards have been driven by the need for a secure, portable, computing platform. Hence it is no surprise that security considerations dominated their research. The CARDIS conferences were created to provide a forum for this research. CARDIS 1998 is the third international conference on Smart Card Research and Advanced Applications, held in Louvain-la-Neuve, Belgium, 14-16 Sept- ber 1998. The ?rst CARDIS was held in Lille, France in November 1994, and the second was held in Amsterdam, The Netherlands in September 1996. The fourth CARDIS is scheduled to take place in Bristol, UK in September 2000 (http://www.cardis.org). This volume contains the refereed papers presented at CARDIS 1998. These 35 papers were ?rst published in a pre-proceedings and distributed to the - tendees at the conference; they have subsequently been revised and updated for this volume. The papers discuss all aspects of smart-card research: Java cards, elect- nic commerce applications, e?ciency, security (including cryptographic al- rithms, cryptographic protocols, and authentication), and architecture. Subm- sions from Europe, the U.S., Asia, and Australia show that this is indeed an international area of research, and one that is becoming more popular as pr- tical demand for smart cards increase. We wish to thank the Program Committee members who did an excellent job in reviewing papers and providing feedback to the authors.
Other people who viewed this bought:
USD$103.20 - Save $27.17 20% off - RRP $130.37
USD$53.92 - Save $5.55 (9%) - RRP $59.47
USD$34.95 - Save $16.13 31% off - RRP $51.08
USD$33.24 - Save $2.59 (7%) - RRP $35.83
USD$80.91 - Save $1.41 (1%) - RRP $82.32
Other books in this category
USD$11.16 - Save $4.07 26% off - RRP $15.23
USD$61.42 - Save $23.34 27% off - RRP $84.76
USD$13.33 - Save $4.95 27% off - RRP $18.28
USD$10.37 - Save $1.81 14% off - RRP $12.18
USD$78.83 - Save $25.76 24% off - RRP $104.59
USD$36.84 - Save $27.96 43% off - RRP $64.80
Table of contents
Session 1: Electronic Money and Commerce.- User-Defined Divisibility of Ecash and a Practical Implementation.- An Operational Model of QuickPay.- Interoperable and Untraceable Debit-Tokens for Electronic Fee Collection.- The Banksys Signature Transport (BST) Protocol.- Session 2: The Java Card I.- The OpenCard Framework.- Smartcards - From Security Tokens to Intelligent Adjuncts.- Formal Proof of Smart Card Applets Correctness.- Session 3: The Java Card II.- Smart Card Payment over Internet with Privacy Protection.- Developing Smart Card-Based Applications Using Java Card.- The Performance of Modern Block Ciphers in JAVA.- Recoverable Persistent Memory for SmartCard.- Session 4: Attacks and Dealing with Speci c Threats.- Pirate Card Rejection.- Secure Authentication with Multiple Parallel Keys.- Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures.- A Practical Implementation of the Timing Attack.- Session 5: Authentication.- Techniques for Low Cost Authentication and Message Authentication.- Enhancing SESAMEV4 with Smart Cards.- How to Say "YES" with Smart Cards.- Session 6: Cryptography and Applications.- An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms.- Efficient Smart-Card Based Anonymous Fingerprinting.- Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol.- The Block Cipher BKSQ.- Session 7: Advanced Encryption Standard.- Serpent and Smartcards.- Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Cards Applications.- Twofish on Smart Cards.- The Block Cipher Rijndael.- Session 8: Architectures and Designs.- Secure Log File Download Mechanisms for Smart Cards.- The Vault, an Architecture for Smartcards to Gain Infinite Memory.- A Data Driven Model for Designing Applications with Smart Cards.- Secure Personalization Using Proxy Cryptography.- Session 9: E cient Implementations I.- Recent Results on Modular Multiplications for Smart Cards.- RSA Signature Algorithm for Microcontroller Implementation.- Session 10: E cient Implementations II.- Efficient Ways to Implement Elliptic Curve Exponentiation on a Smart Card.- Reducing the Collision Probability of Alleged Comp128.- Smart Card Crypto-Coprocessors for Public-Key Cryptography.