Beschreibung
InhaltsangabePreface. Part I: Financial Session. Friendly Observers Ease Off-Line E-Cash; S. Xu, et al. A Performance Comparison of Java Cards for Micropayment Implementation; J. Castellà, et al. Low-Size Coupons for Low-Cost IC Cards; M. Girault. Copy Prevention Scheme for Rights Trading Infrastructure; M. Terada. Elliptic Curve Cryptography on Smart Cards without Coprocessors; A.D. Woodbury, et al. How to Make DES-based Smartcards fit for the 21-st Century; S. Lucks, R. Weis. Part II: Java Session. Formalising Java Safety An overview; P. H. Hartel. Specification of the JavaCard API in JML; E. Poll, et al. Smart Tools for Java Cards; I. Attali, et al. Part III: Web Session. Securing Intelligent Adjuncts Using Trusted Computing Platform Technology; B. Balacheff, et al. Webcard: a Java Card Web Server; J. Rees, P. Honeyman. How to Turn a GSM SIM into a Web Server; S. Guthery, et al. Part IV: Privacy Session. Making Sense of Smart Card Security Certifications; J. Reid, M. Looi. Pressure Sequence' A Novel Method of Protecting Smart Cards; N. Henderson, P. Hartel. Partial revelation of certified identity; F. Boudot. Part V: Biometrics Session. Biometrics, Access Control, Smart Cards: A not so Simple Combination; G. Hachez, et al. Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned; T. van der Putte, J. Keuning. Part VI: Authentication Session. Parasitic Authentication; T. Ebringer, et al. Efficient Downloading and Updating Applications on Portable Devices Using Authentication Trees; L. O'Connor, G. Karjoth. Decentralized Authorization with ECDSA on a Java Smart Card; T. Elo, P. Nikander. JCCap:Capability-based Access Control for Java Card; D. Hagimont, J.-J. Vandewalle. Index.
Autorenportrait
InhaltsangabePreface. Part I: Financial Session. Friendly Observers Ease Off-Line E-Cash; S. Xu, et al. A Performance Comparison of Java Cards for Micropayment Implementation; J. Castellà, et al. Low-Size Coupons for Low-Cost IC Cards; M. Girault. Copy Prevention Scheme for Rights Trading Infrastructure; M. Terada. Elliptic Curve Cryptography on Smart Cards without Coprocessors; A.D. Woodbury, et al. How to Make DES-based Smartcards fit for the 21-st Century; S. Lucks, R. Weis. Part II: Java Session. Formalising Java Safety An overview; P. H. Hartel. Specification of the JavaCard API in JML; E. Poll, et al. Smart Tools for Java Cards; I. Attali, et al. Part III: Web Session. Securing Intelligent Adjuncts Using Trusted Computing Platform Technology; B. Balacheff, et al. Webcard: a Java Card Web Server; J. Rees, P. Honeyman. How to Turn a GSM SIM into a Web Server; S. Guthery, et al. Part IV: Privacy Session. Making Sense of Smart Card Security Certifications; J. Reid, M. Looi. Pressure Sequence' A Novel Method of Protecting Smart Cards; N. Henderson, P. Hartel. Partial revelation of certified identity; F. Boudot. Part V: Biometrics Session. Biometrics, Access Control, Smart Cards: A not so Simple Combination; G. Hachez, et al. Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned; T. van der Putte, J. Keuning. Part VI: Authentication Session. Parasitic Authentication; T. Ebringer, et al. Efficient Downloading and Updating Applications on Portable Devices Using Authentication Trees; L. O'Connor, G. Karjoth. Decentralized Authorization with ECDSA on a Java Smart Card; T. Elo, P. Nikander. JCCap:Capability-based Access Control for Java Card; D. Hagimont, J.-J. Vandewalle. Index.