Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | Jean-Jacques Quisquater, David Samyde |
Automatic Code Recognition for Smartcards Using a Kohonen Neural Network. |
CARDIS |
2002 |
DBLP BibTeX RDF |
|
23 | Bruno Struif, Dirk Scheuermann |
Smartcards with biometric user verification. |
ICME (2) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Matthias Honka |
UNDINE / Smartcards und PKI zur medienbruchfreien elektronischen Softwarebeschaffung. |
DFN-Arbeitstagung über Kommunikationsnetze |
2002 |
DBLP BibTeX RDF |
|
23 | Roger Kilian-Kehr |
Mobile security with smartcards. |
|
2002 |
RDF |
|
23 | Stefan Fünfrocken |
Protecting Mobile Web-Commerce Agents with Smartcards. |
Auton. Agents Multi Agent Syst. |
2001 |
DBLP DOI BibTeX RDF |
|
23 | Antonis Galetsas, Stephan Brunessaux, Stefan Hoernschemeyer |
Achieving universal access for European e-government applications - A case study of two European projects in the field of e-voting and smartcards. |
HCI |
2001 |
DBLP BibTeX RDF |
|
23 | Rajeev Goré, Phuong Thê Nguyên |
CardS4: Modal Theorem Proving on Java Smartcards. |
E-smart |
2001 |
DBLP DOI BibTeX RDF |
security of mobile code, modal deduction |
23 | Pascal Urien, Hayder Saleh, Adel Tizraoui |
XML Smartcards. |
ICN (1) |
2001 |
DBLP DOI BibTeX RDF |
|
23 | Erik Donner |
Chancen und Möglichkeiten von SmartCards im universitären Umfeld. |
DFN Arbeitstagung über Kommunikationsnetze |
2001 |
DBLP BibTeX RDF |
|
23 | Thomas Probst |
Biometrie und SmartCards - Wie kann Datenschutz technisch sichergestellt werden? |
Datenschutz und Datensicherheit |
2000 |
DBLP BibTeX RDF |
|
23 | Stefan Lucks, Rüdiger Weis |
How to Make DES-based Smartcards fit for the 21-st Century. |
CARDIS |
2000 |
DBLP BibTeX RDF |
|
23 | Els Van Herreweghen, Uta Wille |
Using EMV Smartcards for Internet Payments. |
ECIS |
2000 |
DBLP BibTeX RDF |
|
23 | Rita Mayer-Sommer |
Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
|
23 | Markus Kuhn 0001, Oliver Kömmerling |
Physical security of smartcards. |
Inf. Secur. Tech. Rep. |
1999 |
DBLP DOI BibTeX RDF |
|
23 | Stefan Fünfrocken |
Protecting Mobile Web-Commerce Agents with Smartcards. |
ASA/MA |
1999 |
DBLP DOI BibTeX RDF |
|
23 | Vincent Rijmen, Joan Daemen |
Efficient Block Ciphers for Smartcards. |
Smartcard |
1999 |
DBLP BibTeX RDF |
|
23 | Thomas S. Messerges, Ezzy A. Dabbish |
Investigations of Power Analysis Attacks on Smartcards. |
Smartcard |
1999 |
DBLP BibTeX RDF |
|
23 | Naomaru Itoi, Peter Honeyman, Jim Rees |
SCFS: A UNIX Filesystem for Smartcards. |
Smartcard |
1999 |
DBLP BibTeX RDF |
|
23 | Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sloan |
Power Analysis Attacks of Modular Exponentiation in Smartcards. |
CHES |
1999 |
DBLP DOI BibTeX RDF |
|
23 | Mark Stirland |
Smartcards in secure Electronic Commerce. |
Inf. Secur. Tech. Rep. |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Boris Balacheff, Bruno Van Wilder, David Chan |
Smartcards - From Security Tokens to Intelligent Adjuncts. |
CARDIS |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Patrick Biget |
The Vault, an Architecture for Smartcards to Gain Infinite Memory. |
CARDIS |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Ross J. Anderson, Eli Biham, Lars R. Knudsen |
Serpent and Smartcards. |
CARDIS |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Hagen Ploog, Dirk Timmermann |
FPGA-Based Architecture Evaluation of Cryptographic Coprocessors for Smartcards. |
FCCM |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Martine Lapère, Eric Johnson |
User Authentication in Mobile Telecommunication Environments Using Voice Biometrics and Smartcards. |
IS&N |
1997 |
DBLP DOI BibTeX RDF |
|
23 | Thomas J. Alexandre |
Biometrics on Smartcards: An Approach to Keyboard Behavioral Signature. |
CARDIS |
1996 |
DBLP BibTeX RDF |
|
23 | Matt Blaze |
High-Bandwidth Encryption with Low-Bandwidth Smartcards. |
FSE |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Thomas Hardjono, Jennifer Seberry |
Applications of smartcards for anonymous and verifiable databases. |
Comput. Secur. |
1995 |
DBLP DOI BibTeX RDF |
|
23 | John Leach |
Dynamic authentication for smartcards. |
Comput. Secur. |
1995 |
DBLP DOI BibTeX RDF |
|
23 | Jerome Svigals |
Smartcards - A security assessment. |
Comput. Secur. |
1994 |
DBLP DOI BibTeX RDF |
|
23 | Ken J. Fifield |
Smartcards outsmart computer crime. |
Comput. Secur. |
1989 |
DBLP DOI BibTeX RDF |
|
21 | Dawei Zhang, Zhen Han, Wei Jin |
Optimized Java Card transaction mechanism based on object locality. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
transaction, smartcards, Java Card |
21 | Camille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi |
Short-Memory Scalar Multiplication for Koblitz Curves. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
Efficiency, Public key cryptosystems, Smartcards, Koblitz Curves |
21 | Benjamin Arazi |
Communication-Computation Trade-off in Executing ECDSA in a Contactless Smartcard. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
access control, elliptic curve cryptography, smartcards, ECDSA |
21 | Girish B. Ratanpal, Ronald D. Williams, Travis N. Blalock |
An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks. |
IEEE Trans. Dependable Secur. Comput. |
2004 |
DBLP DOI BibTeX RDF |
VLSI, smartcards, DES, security and protection, Power analysis attacks, code breaking |
21 | Ulrich Waldmann, Dirk Scheuermann, Claudia Eckert 0001 |
Protected transmission of biometric user authentication data for oncard-matching. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
oncard-matching, tamper proof environment, authentication, data integrity, biometrics, cryptographic protocols, smartcards, system security, electronic signature |
21 | Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier |
A generic approach for healthcare data anonymization. |
WPES |
2004 |
DBLP DOI BibTeX RDF |
inferences in databases, privacy, anonymization, smartcards |
21 | Carsten Schwesig, Ivan Poupyrev, Eijiro Mori |
Gummi: a bendable computer. |
CHI |
2004 |
DBLP DOI BibTeX RDF |
flexible electronics, mobile computing, interaction design, GUI, handheld devices, smartcards, embodied interaction |
21 | Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stéphane Tinguely |
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
commercial and industrial security, COMP128, authentication, security protocols, side channel attacks, smartcards, GSM |
13 | Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume |
Bipartite modular multiplication with twice the bit-length of multipliers. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Bipartite modular multiplication, Double-size technique, RSA, Smartcard, Montgomery multiplication, Modular multiplication |
13 | Wansuck Yi, Seungjoo Kim, Dongho Won |
Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments. |
ICCSA (2) |
2009 |
DBLP DOI BibTeX RDF |
known-key secrecy, authentication, pervasive computing, biometrics, smart card, key exchange, forward secrecy |
13 | Corinne S. Irwin, Dennis C. Taylor |
Identity, credential, and access management at NASA, from Zachman to attributes. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
attribute-based access control (ABAC), level of assurance (LoA), logical access control system (LACS) |
13 | Jan Camenisch, Thomas Groß 0001 |
Efficient attributes for anonymous credentials. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
efficient attribute encoding, privacy, cryptographic protocols, anonymous credential systems |
13 | Mariano Ceccato, Jasvir Nagra, Paolo Tonella |
Distributing Trust Verification to Increase Application Performance. |
PDP |
2008 |
DBLP DOI BibTeX RDF |
remote trust, smartcard, tamper resistant |
13 | Jing Pan, J. I. den Hartog, Erik P. de Vink |
An Operation-Based Metric for CPA Resistance. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume |
A Black Hen Lays White Eggs. |
CARDIS |
2008 |
DBLP DOI BibTeX RDF |
double-size technique, RSA, smartcard, Montgomery multiplication, efficient implementation |
13 | Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, Srinivas Devadas |
The Trusted Execution Module: Commodity General-Purpose Trusted Computing. |
CARDIS |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
The Long-Short-Key Primitive and Its Applications to Key Security. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Lang Lin, Wayne P. Burleson |
Leakage-based differential power analysis (LDPA) on sub-90nm CMOS cryptosystems. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Roberto Cortiñas, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea, Lucia Draque Penso, Iratxe Soraluze Arriola |
Secure Failure Detection in TrustedPals. |
SSS |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Carole Delporte-Gallet, Hugues Fauconnier, Felix C. Freiling, Lucia Draque Penso, Andreas Tielmann |
From Crash-Stop to Permanent Omission: Automatic Transformation and Weakest Failure Detectors. |
DISC |
2007 |
DBLP DOI BibTeX RDF |
|
13 | MohammadReza Gholami, Seyyed Mohsen Hashemi, Mohammad Teshnehlab |
A Framework for Secure Message Transmission Using SMS-Based VPN. |
CONFENIS (1) |
2007 |
DBLP DOI BibTeX RDF |
Security, Privacy, Trust, E-commerce, E-business, EAI, EDI |
13 | Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume |
Double-Size Bipartite Modular Multiplication. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
bipartite modular multiplication, double-size technique, RSA, smartcard, crypto-coprocessor |
13 | Sea Ling, Seng Wai Loke, Maria Indrawan |
Towards a Model of Interaction for Mutual Aware Devices and Everyday Artifacts. |
UIC |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Marina Blanton, Mikhail J. Atallah |
Succinct representation of flexible and privacy-preserving access rights. |
VLDB J. |
2006 |
DBLP DOI BibTeX RDF |
Privacy-preserving access rights, Flexible access rights, Compact representation |
13 | Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli |
Power Modeling of Precharged Address Bus and Application to Multi-bit DPA Attacks to DES Algorithm. |
PATMOS |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli |
Techniques to Enhance the Resistance of Precharged Busses to Differential Power Analysis. |
PATMOS |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume |
Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
RSA, smartcard, Montgomery multiplication, crypto-coprocessor |
13 | Masayuki Terada, Kensaku Mori, Sadayuki Hongo |
An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Camille Vuillaume, Katsuyuki Okeya |
Flexible Exponentiation with Resistance to Side Channel Attacks. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
fractional width, RSA, side channel attacks, simple power analysis |
13 | Ad M. G. Peeters |
Clockless IC design using handshake technology. |
ISPD |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Reynald Affeldt, Nicolas Marti |
An Approach to Formal Verification of Arithmetic Functions in Assembly. |
ASIAN |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Daihyun Lim, Jae W. Lee, Blaise Gassend, G. Edward Suh, Marten van Dijk, Srinivas Devadas |
Extracting secret keys from integrated circuits. |
IEEE Trans. Very Large Scale Integr. Syst. |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Boaz Barak, Shai Halevi |
A model and architecture for pseudo-random generation with applications to /dev/random. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
dev/random, mixing functions, true randomness, entropy, smart-cards, pseudo-randomness |
13 | Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia |
Secure Biometric Authentication for Weak Computational Devices. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
authentication, biometrics, smart cards, cryptographic hash functions |
13 | JaeCheol Ha, ChangKyun Kim, Sang-Jae Moon, IlHwan Park, HyungSo Yoo |
Differential Power Analysis on Block Cipher ARIA. |
HPCC |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Douglas E. Ennis |
The wireless tightrope: an economical, secure, and user friendly approach for the wireless campus. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
EAP-TLS, MSCHAPv2, PEAP, SSL certificates, SWAN, WLCCP, WEP, 802.1X |
13 | Marina Blanton, Mikhail J. Atallah |
Provable bounds for portable and flexible privacy-preserving access. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
compact policy representation, minimal perfect hash functions, order-preserving minimal perfect hash functions, portable access rights, algorithm analysis |
13 | Antonio Muñoz 0001, Jose Antonio Onieva, Javier López 0001 |
On Secure Profiling. |
DEXA Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Alain Merle, Jessy Clédière |
Security Testing for Hardware Products: The Security Evaluations Practice. |
IOLTS |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm |
Templates as Master Keys. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Sergei P. Skorobogatov |
Data Remanence in Flash Memory Devices. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung |
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
13 | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
Asymmetric Signature, C *, C *-, Hidden Monomial Problem, Side Channel Attacks, SHA-1, SFLASH |
13 | Raul Sánchez-Reillo, Judith Liu-Jimenez, Luis Entrena |
Architectures for Biometric Match-on-Token Solutions. |
ECCV Workshop BioAW |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Engelbert Hubbers, Erik Poll |
Reasoning about Card Tears and Transactions in Java Card. |
FASE |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Jiun-Ming Chen, Bo-Yin Yang |
A More Secure and Efficacious TTS Signature Scheme. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
|
13 | MahnKi Ahn, JaeCheol Ha, Hoon-Jae Lee 0001, Sang-Jae Moon |
A Random M-ary Method Based Countermeasure against Side Channel Attacks. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
Random m-ary Recoding Algorithm, Side Channel Attacks, DPA, Elliptic Curve Cryptosystems, SPA, Power Analysis Attacks |
13 | Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard |
Attacking Unbalanced RSA-CRT Using SPA. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Dominik Haneberg, Wolfgang Reif, Kurt Stenzel |
A Method for Secure Smartcard Applications. |
AMAST |
2002 |
DBLP DOI BibTeX RDF |
|
13 | Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Humberto Martínez Barberá, Gregorio Martínez Pérez |
Different Smartcard-Based Approaches to Physical Access Control. |
InfraSec |
2002 |
DBLP DOI BibTeX RDF |
|
13 | Greg Maitland, Colin Boyd |
Co-operatively Formed Group Signatures. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
|
13 | Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert |
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
Spike attacks, Software countermeasures, Transient fault model, RSA, Chinese Remainder Theorem, Fault attacks, Hardware security, Bellcore attack |
13 | Sergei P. Skorobogatov, Ross J. Anderson |
Optical Fault Induction Attacks. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
13 | Herbert Leitold, Arno Hollosi, Reinhard Posch |
Security Architecture of the Austrian Citizen Card Concept. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
13 | Pieter H. Hartel, Luc Moreau 0001 |
Formalizing the safety of Java, the Java virtual machine, and Java card. |
ACM Comput. Surv. |
2001 |
DBLP DOI BibTeX RDF |
programming, Common criteria |
13 | Roger Kehr, Hendrik Mieves |
SIMspeak - Towards an Open and Secure Application Platform for GSM SIMs. |
E-smart |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Pascal Urien |
Programming Internet Smartcard with XML Scripts. |
E-smart |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Clemens H. Cap, Nico Maibaum, Lars Heyden |
Extending the Data Storage Capabilities of a Java-Based Smartcard. |
ISCC |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Kimio Kuramitsu, Ken Sakamura |
Towards ubiquitous database in mobile commerce. |
MobiDE |
2001 |
DBLP DOI BibTeX RDF |
data model and querying for ubiquitous data, smartcard database, ubiquitous computing, mobile commerce |
13 | Rainer Steinwandt, Willi Geiselmann, Thomas Beth |
A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
13 | David May 0001, Henk L. Muller, Nigel P. Smart |
Non-deterministic Processors. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali |
Identification Protocols Secure against Reset Attacks. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Kouichi Itoh, Masahiko Takenaka, Naoya Torii |
DPA Countermeasure Based on the "Masking Method". |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
masking method, DPA, countermeasure, Rijndael |
13 | David May 0001, Henk L. Muller, Nigel P. Smart |
Random Register Renaming to Foil DPA. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Diomidis Spinellis |
Reflection as a mechanism for software integrity verification. |
ACM Trans. Inf. Syst. Secur. |
2000 |
DBLP DOI BibTeX RDF |
message digest, cryptographic hash function, embedded device |
13 | Juan A. Garay, Jessica Staddon, Avishai Wool |
Long-Lived Broadcast Encryption. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Praveen Seshadri |
"Honey, I Shrunk the DBMS": Footprint, Mobility, and Beyond (Panel). |
SIGMOD Conference |
1999 |
DBLP DOI BibTeX RDF |
small-footprint database, mobile computing |
13 | Sigrid Gürgens, Javier López 0001, René Peralta 0001 |
Efficient Detection of Failure Modes in Electronic Commerce Protocols. |
DEXA Workshops |
1999 |
DBLP DOI BibTeX RDF |
|
13 | Stefan Lucks |
Accelerated Remotely Keyed Encruption. |
FSE |
1999 |
DBLP DOI BibTeX RDF |
|