Abstract. The executions of operating system services based on smart cards allow one to personalize some functionalities of the operating sys-tem by using the secret information stored in a smart card and the basic computations that a smart card can perform. However, current solutions for integrating smart card features in operating system services require at least a partial execution of the operating system functionalities at “user level”. Such executions decrease the security and the performance of the system as they are less robust compared to the kernel-level ones. In this paper we present the design and implementation of SmartK, a kernel module that integrates directly in the Linux kernel the support of smart cards. The use of SmartK a...
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for i...
Smart cards are examples of advanced chip technology. They allow information transfer between the ca...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
This paper presents an open and modular middleware for smart cards, providing a simple abstraction o...
This master thesis developed and tested the idea that smart cards are able to help mitigate security...
To be widely accepted, smart cards must contain completely trustworthy software. Because smart cards...
The operating system of a smart card is a safety critical system. Distributed in millions, smart car...
Tez (Yüksek Lisans) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2010Thesis (M.Sc.) -- ...
In this thesis we propose a design for a ubiquitous and interoperable device based on the smart card...
The diploma thesis is focused on cryptography with smart cards. It describes smart cards from hardwa...
This dissertation presents the findings of a generic model aimed at providing secure communication w...
This thessis discusses the use of contactless smart card technology for authentication in an Linux d...
Computing WCET in a resource-constrained device such as a smart card in a safe manner raises some di...
One often hears the claim that smart cards are the solution to a number of security problems, includ...
ENGELSK: More and more companies are digitizing their services, this is because their customers dema...
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for i...
Smart cards are examples of advanced chip technology. They allow information transfer between the ca...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
This paper presents an open and modular middleware for smart cards, providing a simple abstraction o...
This master thesis developed and tested the idea that smart cards are able to help mitigate security...
To be widely accepted, smart cards must contain completely trustworthy software. Because smart cards...
The operating system of a smart card is a safety critical system. Distributed in millions, smart car...
Tez (Yüksek Lisans) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2010Thesis (M.Sc.) -- ...
In this thesis we propose a design for a ubiquitous and interoperable device based on the smart card...
The diploma thesis is focused on cryptography with smart cards. It describes smart cards from hardwa...
This dissertation presents the findings of a generic model aimed at providing secure communication w...
This thessis discusses the use of contactless smart card technology for authentication in an Linux d...
Computing WCET in a resource-constrained device such as a smart card in a safe manner raises some di...
One often hears the claim that smart cards are the solution to a number of security problems, includ...
ENGELSK: More and more companies are digitizing their services, this is because their customers dema...
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for i...
Smart cards are examples of advanced chip technology. They allow information transfer between the ca...
Modern computer systems have critical security problems because of two wrong assumptions security sy...