標(biāo)題: Titlebook: Smart Card. Research and Applications; Third International Jean-Jacques Quisquater,Bruce Schneier Conference proceedings 2000 Springer-Ver [打印本頁] 作者: 詞源法 時(shí)間: 2025-3-21 19:17
書目名稱Smart Card. Research and Applications影響因子(影響力)
書目名稱Smart Card. Research and Applications影響因子(影響力)學(xué)科排名
書目名稱Smart Card. Research and Applications網(wǎng)絡(luò)公開度
書目名稱Smart Card. Research and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Smart Card. Research and Applications被引頻次
書目名稱Smart Card. Research and Applications被引頻次學(xué)科排名
書目名稱Smart Card. Research and Applications年度引用
書目名稱Smart Card. Research and Applications年度引用學(xué)科排名
書目名稱Smart Card. Research and Applications讀者反饋
書目名稱Smart Card. Research and Applications讀者反饋學(xué)科排名
作者: 流浪 時(shí)間: 2025-3-21 22:05
Smart Card Payment over Internet with Privacy Protectionhnology such as the Java. Card. on secure micro-payment over the Internet. One of the special properties of our solution is the identity of the purchaser can remain anonymous both to the merchant and the bank. The design and correctness of the proposed scheme are discussed here.作者: bourgeois 時(shí)間: 2025-3-22 03:21
A Practical Implementation of the Timing Attack (128-bit keys can be recovered in few seconds using a personal computer and less than 10000 samples). We therefore show that the timing attack represents an important threat against cryptosystems, which must be very seriously taken into account.作者: ellagic-acid 時(shí)間: 2025-3-22 06:50
Techniques for Low Cost Authentication and Message Authenticatione amount of secret key bits (typically 10 to 20 bits per authentication), and provide provably secure authentication and message authentication. Applications mainly include low cost prepaid cards for telephone, parking meters, transportation, automatic vending machines, etc.作者: Cupidity 時(shí)間: 2025-3-22 12:42 作者: ALIBI 時(shí)間: 2025-3-22 13:11
The Banksys Signature Transport (BST) Protocoline debit/credit payment applications. The protocol, when applied for purse payments or debit/credit allows transaction timings of the order of 1 second if implemented on currently mass-produced IC Cards.作者: Tailor 時(shí)間: 2025-3-22 19:36 作者: COW 時(shí)間: 2025-3-22 22:24 作者: Flatter 時(shí)間: 2025-3-23 02:17 作者: Projection 時(shí)間: 2025-3-23 07:10 作者: Eructation 時(shí)間: 2025-3-23 11:13
Smartcards – From Security Tokens to Intelligent Adjunctsically JavaCards. Various inadequacies of ISO standards are pointed out, an extension of the JavaCard API to support this new model is proposed, and a possible integration into the PC/SC infrastructure is described.作者: 磨坊 時(shí)間: 2025-3-23 14:57 作者: 同來核對(duì) 時(shí)間: 2025-3-23 19:08
Recoverable Persistent Memory for SmartCardsistency in a smartcard. Then, we adapt and compare two recovery algorithms used in Database Management Systems (shadow paging and before-image logging) to the smartcard memory features. At last, we present a prototype, which demonstrates the feasibility of these algorithms in a smartcard.作者: 初學(xué)者 時(shí)間: 2025-3-24 00:15 作者: fetter 時(shí)間: 2025-3-24 05:30 作者: incision 時(shí)間: 2025-3-24 07:25
User-Defined Divisibility of Ecash and a Practical Implementationricted to withdrawal-time choices, and can be done during off-line payments in any convenient way. It is the first divisible-coin scheme in which the amount of required storage is small (about 1000 bytes) regardless of the division of the coins.作者: Heretical 時(shí)間: 2025-3-24 11:24
An Operational Model of QuickPayeen built to assist in the search for weaknesses in the protocols. As a result of this model building activity, one minor weakness has been found. Another more serious weakness has been re-discovered and a number of solutions are proposed..The full paper gives the details of the model.作者: 委屈 時(shí)間: 2025-3-24 17:37 作者: 等待 時(shí)間: 2025-3-24 22:58
The Banksys Signature Transport (BST) Protocol an off-line terminal where the IC Card’s cryptographic capability is limited to computing one-way functions and MACs. The authentication of the IC Card and its data are based on a Challenge-Response protocol using one-way functions. The protocol is especially suited for use in off-line electronic p作者: nocturia 時(shí)間: 2025-3-25 01:37 作者: surrogate 時(shí)間: 2025-3-25 03:53 作者: 法律的瑕疵 時(shí)間: 2025-3-25 08:56 作者: GROWL 時(shí)間: 2025-3-25 15:07
Smart Card Payment over Internet with Privacy Protectionespecially for low cost products and services, is becoming popular. Although many secure payment standards, like SET, are available, they are either ineffective for large volume micro-payment or indifferent to the cardholders’ privacy. In this paper, we propose a solution based on the smart card tec作者: 在前面 時(shí)間: 2025-3-25 15:55 作者: 小母馬 時(shí)間: 2025-3-25 21:59 作者: 恭維 時(shí)間: 2025-3-26 01:49
Pirate Card Rejectionxpensive to produce, easy to distribute, and user-installable via externally accessible slots, sales of counterfeit cards may offer the pirate a profitable business. However, since the legitimate infrastructure is likely to be backed by a significant operating budget, it is reasonable to design that作者: fluoroscopy 時(shí)間: 2025-3-26 07:27
Secure Authentication with Multiple Parallel Keysions involving symmetric cryptography put the global shared secret in every verification device. We propose a more robust solution using Multiple Parallel Keys: use . symmetric keys to authenticate, and give each verification device only one of them.作者: 溝通 時(shí)間: 2025-3-26 11:46 作者: needle 時(shí)間: 2025-3-26 15:17
A Practical Implementation of the Timing Attackblicly introduced by Kocher, is developed here to attack an earlier version of the CASCADE smart card. We propose several improvements on Kocher’s ideas, leading to a practical implementation that is able to break a 512-bit key in few hours, provided we are able to collect 300000 timing measurements作者: crockery 時(shí)間: 2025-3-26 18:22 作者: 愛社交 時(shí)間: 2025-3-26 23:38
Enhancing SESAMEV4 with Smart Cardsnments. Several vulnerabilities are identified in SESAMEV4’s user authentication process. This paper proposes four options for enhancing this user authentication process by integrating smart cards into SESAMEV4. The proposals are shown to successfully increase the level of security of SESAMEV4 and w作者: aesthetic 時(shí)間: 2025-3-27 04:18
How to Say “YES” with Smart Cardsevices. In this work we demonstrate that in the ubiquitous environment certain architectural considerations are needed to assure secure and fast services. Specifically, we demonstrate problems that may arise when employing a service that combines “cryptographic integrity calculation” together with i作者: 大包裹 時(shí)間: 2025-3-27 08:45 作者: Osteoarthritis 時(shí)間: 2025-3-27 12:29 作者: certain 時(shí)間: 2025-3-27 15:36
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/s/image/868623.jpg作者: Immortal 時(shí)間: 2025-3-27 18:50 作者: orthodox 時(shí)間: 2025-3-27 22:10
The Performance of Modern Block Ciphers in JAVAThis paper explores the question of how fast modern block ciphers can be realized as machine-independent Java implementations. The ciphers we considered include well-known proven ones such as DES and IDEA and recent candidates for the proposed DES-successor AES.作者: 埋葬 時(shí)間: 2025-3-28 03:40
Jean-Jacques Quisquater,Bruce SchneierIncludes supplementary material: 作者: 運(yùn)氣 時(shí)間: 2025-3-28 06:31 作者: 煩憂 時(shí)間: 2025-3-28 11:27 作者: OFF 時(shí)間: 2025-3-28 18:20
Secure Authentication with Multiple Parallel Keysions involving symmetric cryptography put the global shared secret in every verification device. We propose a more robust solution using Multiple Parallel Keys: use . symmetric keys to authenticate, and give each verification device only one of them.作者: 高爾夫 時(shí)間: 2025-3-28 22:36
An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithmsncryption of) .-th roots. So far, all the VESs for discrete logarithms are inefficient, but there exists an efficient VES for .-th roots. In this paper, we presents an efficient VES for discrete logarithms and prove its security.作者: Hectic 時(shí)間: 2025-3-29 01:08 作者: GLUE 時(shí)間: 2025-3-29 06:57 作者: 珍奇 時(shí)間: 2025-3-29 09:33
Jean-Fran?ois Dhem,Fran?ois Koeune,Philippe-Alexandre Leroux,Patrick Mestré,Jean-Jacques Quisquater,作者: BLA 時(shí)間: 2025-3-29 13:24
Mark Looi,Paul Ashley,Loo Tang Seet,Richard Au,Gary Gaskell,Mark Vandenwauver作者: Limousine 時(shí)間: 2025-3-29 17:49 作者: deviate 時(shí)間: 2025-3-29 20:52 作者: 蝕刻術(shù) 時(shí)間: 2025-3-30 01:18 作者: 座右銘 時(shí)間: 2025-3-30 06:54
byapplying dynamic feedback, but not by using static feedback.The bookis intended for researchers in mathematicalnonlinear systems theory. Geometric techniques play a keyrole in the book. Therefore, in Chapter 6 algebraictechniques are recalled and used.978-3-540-54543-9978-3-540-38461-8Series ISSN 0170-8643 Series E-ISSN 1610-7411 作者: Alveolar-Bone 時(shí)間: 2025-3-30 11:13 作者: DEMN 時(shí)間: 2025-3-30 16:02 作者: 搖曳 時(shí)間: 2025-3-30 19:46 作者: 座右銘 時(shí)間: 2025-3-30 21:04 作者: 泛濫 時(shí)間: 2025-3-31 04:22
Reto Hermann,Dirk Husemann,Peter Trommler byapplying dynamic feedback, but not by using static feedback.The bookis intended for researchers in mathematicalnonlinear systems theory. Geometric techniques play a keyrole in the book. Therefore, in Chapter 6 algebraictechniques are recalled and used.978-3-540-54543-9978-3-540-38461-8Series ISSN 0170-8643 Series E-ISSN 1610-7411 作者: 鎮(zhèn)痛劑 時(shí)間: 2025-3-31 07:05 作者: ELATE 時(shí)間: 2025-3-31 12:34 作者: Musket 時(shí)間: 2025-3-31 15:44
Rüdiger Weis,Stefan Lucksintegrations when they have been applied to the very special case of international outsourcing, or offshoring. Such phenomena as ‘international fragmentation of production’ (Jones and Kierzkowski, 2001), international trade in intermediate commodities and in services, and MNC networks (Kleinert, 200作者: 疾馳 時(shí)間: 2025-3-31 17:51 作者: 胡言亂語 時(shí)間: 2025-4-1 00:30 作者: 浮雕 時(shí)間: 2025-4-1 04:03
Yair Frankel,Moti Yung, economic and environmental goals are linked and balanced and the importance of knowledge creation and human resource development in achieving economic development are acknowledged. access to knowledge, ideas, new technology, suppliers and customers, its ‘soft’ enabling infrastructure, are increasi作者: obsession 時(shí)間: 2025-4-1 07:26 作者: Daily-Value 時(shí)間: 2025-4-1 11:32 作者: 小說 時(shí)間: 2025-4-1 17:16