Checking secure interactions of smart card applets: Extended version

被引:0
|
作者
Bieber, P. [1 ]
Cazin, J. [1 ]
Girard, P. [1 ]
Lanet, J.-L. [1 ]
Wiels, V. [1 ]
Zanon, G. [1 ]
机构
[1] ONERA-CERT/DTIM, BP 4025, 2 Avenue E. Belin, F-31055 Toulouse Cedex 4, France
关键词
Electronic purse - Secure interactions - Security policy - Smart card applets;
D O I
10.3233/JCS-2002-10404
中图分类号
学科分类号
摘要
引用
收藏
页码:369 / 398
相关论文
共 50 条
  • [41] Cryptanalysis of an Efficient and Secure Smart Card Based Password Authentication Scheme
    Liu, Chi-Wei
    Tsai, Cheng-Yi
    Hwang, Min-Shiang
    RECENT DEVELOPMENTS IN INTELLIGENT SYSTEMS AND INTERACTIVE APPLICATIONS (IISA2016), 2017, 541 : 188 - 193
  • [42] Zero footprint secure Internet authentication using Network Smart Card
    Ali, AM
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2006, 3928 : 91 - 104
  • [43] A Smart Card Oriented Secure Electronic Voting Machine Built on NTRU
    Shaheen, Safdar
    Yousaf, Muhammad
    Jalil, Mudassar
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (03) : 386 - 393
  • [44] Model-Driven Code Generation for Secure Smart Card Applications
    Moebius, Nina
    Stenzel, Kurt
    Grandy, Holger
    Reif, Wolfgang
    ASWEC 2009: 20TH AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2009, : 44 - 53
  • [45] Secure key generation from biased PUFs: extended version
    Maes, Roel
    van der Leest, Vincent
    van der Sluis, Erik
    Willems, Frans
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (02) : 121 - 137
  • [46] An Encryption Scheme for Smart Home Data Link Based on Secure SD Card
    Liu, Hong Wei
    Zhang, Hong
    FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 1145 - 1150
  • [47] Secure limitation analysis of public-key cryptography for smart card settings
    Tian, Youliang
    Li, Qiuxian
    Hu, Jia
    Lin, Hui
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (02): : 1423 - 1440
  • [48] Secure limitation analysis of public-key cryptography for smart card settings
    Youliang Tian
    Qiuxian Li
    Jia Hu
    Hui Lin
    World Wide Web, 2020, 23 : 1423 - 1440
  • [49] A JC-BioAPI compliant smart card with biometrics for secure access control
    Osborne, M
    Ratha, NK
    AUDIO-BASED AND VIDEO-BASED BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2003, 2688 : 903 - 910
  • [50] A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    Mayes, Keith
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 336 - 345