SECURE TERMINAL INTERFACE MODULE FOR SMART CARD APPLICATIONS.

被引:0
|
作者
Anon
机构
来源
IBM technical disclosure bulletin | 1985年 / 28卷 / 04期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1488 / 1489
相关论文
共 50 条
  • [1] A Generic Proxy for Secure Smart Card-Enabled Web Applications
    Starnberger, Guenther
    Froihofer, Lorenz
    Goeschka, Karl M.
    WEB ENGINEERING, 2010, 6189 : 370 - 384
  • [2] Model-Driven Code Generation for Secure Smart Card Applications
    Moebius, Nina
    Stenzel, Kurt
    Grandy, Holger
    Reif, Wolfgang
    ASWEC 2009: 20TH AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2009, : 44 - 53
  • [3] Secure smart card reader design
    Martinez-Pelaez, Rafael
    Rico-Novella, Francisco
    Satizabal, Cristina
    2008 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2008, : 276 - +
  • [4] SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications
    Moebius, Nina
    Stenzel, Kurt
    Grandy, Holger
    Reif, Wolfgang
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 841 - 846
  • [5] Videotex Terminal for Different Applications.
    Delic, D.
    Perkovic, B.
    Elektrotehnika Zagreb, 1987, 30 (04): : 185 - 199
  • [6] Establishing trustworthy terminal with smart card
    Zheng, JW
    Liu, MS
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 277 - 282
  • [7] SECURE NETWORK ACCESS USING MULTIPLE APPLICATIONS OF AT-AND-TS SMART-CARD
    SHERMAN, SA
    SKIBO, R
    MURRAY, RS
    AT&T TECHNICAL JOURNAL, 1994, 73 (05): : 61 - 72
  • [8] Towards a secure and practical multifunctional smart card
    Bakdi, I
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2006, 3928 : 16 - 31
  • [9] A Comprehensively Secure Smart card access controls
    Alazmi, Sulaiman
    Khan, Ahmad Raza
    Yu, Qian
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [10] Checking secure interactions of smart card applets
    Bieber, P
    Cazin, J
    Girard, P
    Lanet, JL
    Wiels, V
    Zanon, G
    COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 1 - 16