The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Smartcard with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1992-1998 (15) 1999 (33) 2000-2001 (30) 2002 (15) 2003 (17) 2004-2005 (33) 2006 (24) 2007 (19) 2008 (20) 2009-2010 (16) 2011-2012 (16) 2013-2016 (16) 2017-2021 (15) 2022-2023 (3)
Publication types (Num. hits)
article(51) incollection(2) inproceedings(215) phdthesis(3) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 271 occurrences of 156 keywords

Results
Found 272 publication records. Showing 272 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Olivier Savry, Florian Pebay-Peyroula, François Dehmas, Gérard Robert, Jacques Reverdy RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ISO 14443, Tausworthe cell, RFID, smartcard, eavesdropping, RNG
20Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA, smartcard, Montgomery multiplication, crypto-coprocessor
20Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas Silicon physical random functions. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF physical random function, unclonability, identification, smartcard, tamper resistance, physical security
20Kimio Kuramitsu, Ken Sakamura Towards ubiquitous database in mobile commerce. Search on Bibsonomy MobiDE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF data model and querying for ubiquitous data, smartcard database, ubiquitous computing, mobile commerce
20Kimio Kuramitsu, Tadashi Murakami, Hajime Matsuda, Ken Sakamura TTP: Secure ACID Transfer Protocol for Electronic Ticket between Personal Tamper-Proof Devices . Search on Bibsonomy COMPSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF electronic transferable ticket, ACID transfer protocols and security, Electronic commerce, smartcard
20Bob Briscoe, Ian Fairman Nark: receiver-based multicast non-repudiation and key management. Search on Bibsonomy EC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Internet, multicast, watermark, key management, smartcard, non-repudiation, audit trail
20Marcus Oestreicher Transactions in Java Card. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Transactions, Smartcard, Java Card
13Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan 0002 An effective crypto-biometric system for secure email in wireless environment. Search on Bibsonomy MoMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bio-passphrase, biometric key, email security
13Wojciech Mostowski, Erik Poll, Julien Schmaltz, Jan Tretmans, Ronny Wichers Schreur Model-Based Testing of Electronic Passports. Search on Bibsonomy FMICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Thierry Lecomte Applying a Formal Method in Industry: A 15-Year Trajectory. Search on Bibsonomy FMICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF B formal method, deployment, industry
13Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur Wirelessly Pickpocketing a Mifare Classic Card. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Corinne S. Irwin, Dennis C. Taylor Identity, credential, and access management at NASA, from Zachman to attributes. Search on Bibsonomy IDtrust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attribute-based access control (ABAC), level of assurance (LoA), logical access control system (LACS)
13Song Sun, Zijun Yan, Joseph Zambreno Experiments in attacking FPGA-based embedded systems using differential power analysis. Search on Bibsonomy EIT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Fuchun Guo, Yi Mu 0001, Zhide Chen Identity-Based Online/Offline Encryption. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Gerald Madlmayr, Oliver Dillinger, Josef Langer, Josef Scharinger Management of Multiple Cards in NFC-Devices. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Prouff Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Fabio Massacci, Frank Piessens, Ida Sri Rejeki Siahaan Security-By-Contract for the Future Internet. Search on Bibsonomy FIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Scott D. Mainwaring, Wendy March, Bill Maurer From meiwaku to tokushita!: lessons for digital money design from japan. Search on Bibsonomy CHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF digital money, e-wallets, ubiquitous computing, ethnography, mobile payment, japan, e-cash
13Gerald Madlmayr, Peter Kleebauer, Josef Langer, Josef Scharinger Secure Communication between Web Browsers and NFC Targets by the Example of an e-Ticketing System. Search on Bibsonomy EC-Web The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Roberto Cortiñas, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea, Lucia Draque Penso, Iratxe Soraluze Arriola Secure Failure Detection in TrustedPals. Search on Bibsonomy SSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Frédéric Amiel, Benoit Feix, Karine Villegas Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF arithmetic coprocessors, reverse engineering, Public key cryptography, side-channel analysis, exponentiation
13Umut Topkara, Mikhail J. Atallah, Mercan Topkara Passwords decay, words endure: secure and re-usable multiple password mnemonics. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mnemonic sentence, usability, authentication, natural language processing, passwords
13Augusto Jun Devegili, Michael Scott, Ricardo Dahab Implementing Cryptographic Pairings over Barreto-Naehrig Curves. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Feike W. Dillema, Simone Lupetti Rendezvous-based access control for medical records in the pre-hospital environment. Search on Bibsonomy HealthNet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF aggregation threat, pre-hospital environment, security model, capabilities, electronic health records
13MohammadReza Gholami, Seyyed Mohsen Hashemi, Mohammad Teshnehlab A Framework for Secure Message Transmission Using SMS-Based VPN. Search on Bibsonomy CONFENIS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Privacy, Trust, E-commerce, E-business, EAI, EDI
13Luis A. Plana, Doug A. Edwards, Sam Taylor, Luis A. Tarazona, Andrew Bardsley Performance-driven syntax-directed synthesis of asynchronous processors. Search on Bibsonomy CASES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF handshake components, syntax-directed synthesis, asynchronous circuits
13Jinyoung Moon, Jongyoul Park, Eui Hyun Paik JavaCard-based Two-Level User Key Management for IP Conditional Access Systems. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Eddie Jaffuel, Bruno Legeard LEIRIOS Test Generator: Automated Test Generation from B Models. Search on Bibsonomy B The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Alper Kanak, Ibrahim Sogukpinar Fingerprint Hardening with Randomly Selected Chaff Minutiae. Search on Bibsonomy CAIP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Marina Blanton, Mikhail J. Atallah Succinct representation of flexible and privacy-preserving access rights. Search on Bibsonomy VLDB J. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Privacy-preserving access rights, Flexible access rights, Compact representation
13Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli Power Modeling of Precharged Address Bus and Application to Multi-bit DPA Attacks to DES Algorithm. Search on Bibsonomy PATMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Pascal Urien, Mesmin Dandjinou Designing Smartcards for Emerging Wireless Networks. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Martin Schaffer, Peter Schartner Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Thomas Neubauer, Edgar R. Weippl, Stefan Biffl Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Gilles Barthe, Tamara Rezk, David A. Naumann Deriving an Information Flow Checker and Certifying Compiler for Java. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Richard Banach Retrenchment Tutorial. Search on Bibsonomy SEFM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Mikhail J. Atallah, Jiangtao Li 0001 Secure outsourcing of sequence comparisons . Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Secure outsourcing, Privacy, Edit distance, Secure multiparty computation, Sequence comparison
13Paul D. Ezhilchelvan, Santosh K. Shrivastava A Family of Trusted Third Party Based Fair-Exchange Protocols. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Trusted Third Party (TTP), crash tolerance, security, distributed systems, smartcards, Fair exchange
13Ningyi Xu, Shaohua Li, Wei Yu, Guanghui He, Hao Zhang, Fei Luo, Zucheng Zhou The design and implementation of a DVB receiving chip with PCI interface. Search on Bibsonomy ASP-DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Stefano Bistarelli, Francesco Santini 0001, Anna Vaccarelli An Asymmetric Fingerprint Matching Algorithm for Java Card™. Search on Bibsonomy AVBPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Masayuki Terada, Kensaku Mori, Kazuhiko Ishii, Sadayuki Hongo, Tomonori Usaka, Noboru Koshizuka, Ken Sakamura TENeT: A Framework for Distributed Smartcards. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Wieland Fischer, Jean-Pierre Seifert High-Speed Modular Multiplication. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Sedlaks algorithm, Computer arithmetic, Modular multiplication, Implementation issues, Booth recoding
13Gilles Barthe, Guillaume Dufay A Tool-Assisted Framework for Certified Bytecode Verification. Search on Bibsonomy FASE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Johannes Blömer, Jean-Pierre Seifert Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Secure Banking, Smart Cards, AES, Fault Attacks, Implementation Issues
13Bruce Christianson Where Have All the Protocols Gone? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Deok-Gyu Lee, Im-Yeong Lee, Jong-Keun Ahn, Yong-Hae Kong The Illegal Copy Protection Using Hidden Agent. Search on Bibsonomy EurAsia-ICT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Won Jay Song, Byung-Ha Ahn, Won Hee Kim Healthcare Information Systems Using Digital Signature and Synchronized Smart Cards via the Internet. Search on Bibsonomy ITCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13David von Oheimb, Volkmar Lotz Formal Security Analysis with Interacting State Machines. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Robert Siegmund, Dietmar Müller 0001 A novel synthesis technique for communication controller hardware from declarative data communication protocol specifications. Search on Bibsonomy DAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF controller hardware synthesis, interface-based design, protocol specification
13Gilles Barthe, Dilian Gurov, Marieke Huisman Compositional Verification of Secure Applet Interactions. Search on Bibsonomy FASE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Roger Kehr, Hendrik Mieves SIMspeak - Towards an Open and Secure Application Platform for GSM SIMs. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Naomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves Personal Secure Booting. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13David May 0001, Henk L. Muller, Nigel P. Smart Non-deterministic Processors. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13David May 0001, Henk L. Muller, Nigel P. Smart Random Register Renaming to Foil DPA. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Ross J. Anderson The Correctness of Crypto Transaction Sets. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Thomas S. Messerges Securing the AES Finalists Against Power Analysis Attacks. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Pieter H. Hartel, Eduard de Jong A Programming and a Modelling Perspective on the Evaluation of Java Card Implementations. Search on Bibsonomy Java Card Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Juan A. Garay, Jessica Staddon, Avishai Wool Long-Lived Broadcast Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Rita Mayer-Sommer Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Thomas S. Messerges Using Second-Order Power Analysis to Attack DPA Resistant Software. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Neil Daswani, Dan Boneh Experimenting with Electronic Commerce on the PalmPilot. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF PalmPilot, digital wallet, electronic commerce, personal digital assistants, electronic payment systems
13Detlef Hühnlein Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
13Roger Kehr, Joachim Posegga, Harald Vogt PCA: Jini-based Personal Card Assistant. Search on Bibsonomy CQRE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
13Aviad Kipnis, Jacques Patarin, Louis Goubin Unbalanced Oil and Vinegar Signature Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
13Michael Hartmann, Sachar Paulus, Tsuyoshi Takagi NICE - New Ideal Coset Encryption. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF fast decryption, quadratic order, smart card implementation, public-key cryptosystem
13Markus Jakobsson, David M'Raïhi Mix-Based Electronic Payments. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
13Adam L. Young, Moti Yung Sliding Encryption: A Cryptographic Tool for Mobile Agents. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
13Moni Naor, Benny Pinkas Visual Authentication and Identification. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Authentication, identification, visual cryptography
13Dan Craigen, Susan L. Gerhart, Ted Ralston Formal Methods Reality Check: Industrial Usage. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF real-time systems, Formal methods, formal verification, safety-critical systems, industrial applications, validation and verification, technology assessment
13Dan Craigen, Susan L. Gerhart, Ted Ralston Formal Methods Reality Check: Industrial Usage. Search on Bibsonomy FME The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
13Ross J. Anderson UEPS - A Second Generation Electronic Wallet. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #272 of 272 (100 per page; Change: )
Pages: [<<][1][2][3]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license