|
|
|||
|
||||
OverviewThis volume constitutes the thoroughly refereed post-proceedings of the Third International Conference on Smart Card Research and Advanced Applications, CARDIS'98, held in Louvain-la-Neuve, Belgium in September 1998. The 35 revised full papers presented were carefully reviewed and updated for inclusion in this book. All current aspects of smart card research and applications development are addressed, in particular: Java cards, electronic commerce, efficiency, security (including cryptographic algorithms, cryptographic protocols, and authentication), and architecture. Full Product DetailsAuthor: Jean-Jacques Quisquater , Bruce SchneierPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2000 ed. Volume: 1820 Dimensions: Width: 15.50cm , Height: 2.00cm , Length: 23.30cm Weight: 1.230kg ISBN: 9783540679233ISBN 10: 3540679235 Pages: 379 Publication Date: 01 September 2000 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsSession 1: Electronic Money and Commerce.- User-Defined Divisibility of Ecash and a Practical Implementation.- An Operational Model of QuickPay.- Interoperable and Untraceable Debit-Tokens for Electronic Fee Collection.- The Banksys Signature Transport (BST) Protocol.- Session 2: The Java Card I.- The OpenCard Framework.- Smartcards - From Security Tokens to Intelligent Adjuncts.- Formal Proof of Smart Card Applets Correctness.- Session 3: The Java Card II.- Smart Card Payment over Internet with Privacy Protection.- Developing Smart Card-Based Applications Using Java Card.- The Performance of Modern Block Ciphers in JAVA.- Recoverable Persistent Memory for SmartCard.- Session 4: Attacks and Dealing with Speci c Threats.- Pirate Card Rejection.- Secure Authentication with Multiple Parallel Keys.- Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures.- A Practical Implementation of the Timing Attack.- Session 5: Authentication.- Techniques for Low Cost Authentication and Message Authentication.- Enhancing SESAMEV4 with Smart Cards.- How to Say YES with Smart Cards.- Session 6: Cryptography and Applications.- An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms.- Efficient Smart-Card Based Anonymous Fingerprinting.- Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol.- The Block Cipher BKSQ.- Session 7: Advanced Encryption Standard.- Serpent and Smartcards.- Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Cards Applications.- Twofish on Smart Cards.- The Block Cipher Rijndael.- Session 8: Architectures and Designs.- Secure Log File Download Mechanisms for Smart Cards.- The Vault, an Architecture for Smartcards to Gain Infinite Memory.- A Data Driven Model for Designing Applications with Smart Cards.- Secure Personalization Using Proxy Cryptography.- Session 9: E cient Implementations I.- Recent Results on Modular Multiplications for Smart Cards.- RSA Signature Algorithm for Microcontroller Implementation.- Session 10: E cient Implementations II.- Efficient Ways to Implement Elliptic Curve Exponentiation on a Smart Card.- Reducing the Collision Probability of Alleged Comp128.- Smart Card Crypto-Coprocessors for Public-Key Cryptography.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |