One often hears the claim that smart cards are the solution to a number of security problems, including those arising in point-of-sale systems. This paper argues that many proposed smart card systems still lack effective security for point-of-sale applications. We consider the point-of-sale terminal as a potentially hostile environment to the smart card. Moreover, we discuss several types of modifications that can be made to smart cards to improve their security and address this problem. We prove a set of equivalences among a number of these modifications: ffl private input = private output ffl trusted input + one-bit trusted output = trusted output + one-bit trusted input ffl secure input = secure outpu
The User Centric Smart Card Ownership Model (UCOM) provides an open and dynamic smart card environme...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
Abstract. The design of secure and efficient smart-card-based password authentication schemes remain...
One often hears the claim that smart cards are the solution to a number of security problems, includ...
This master thesis developed and tested the idea that smart cards are able to help mitigate security...
The evolution of smart card technology provides an interesting case study of the relationship and in...
Smart cards offer a wide variety of applications that could revolutionise payment transactions, redu...
In this paper we present different ways for an attacker to tamper with a digital signature scheme. ...
Smart cards are being toted as the secure means of payment for the future. But there are still some ...
The design of secure and efficient smart-card-based password authentication schemes remains a challe...
Smart cards are examples of advanced chip technology. They allow information transfer between the ca...
Abstract. We study the security requirements for remote authentication with password protected smart...
Modern smartcards, capable of sophisticated cryptography, provide a high assurance of tamper resista...
There is a need for assessing the security of smart cards by an independent third party, specially i...
This paper initiates the study of two specific security threats on smart-card-based password authent...
The User Centric Smart Card Ownership Model (UCOM) provides an open and dynamic smart card environme...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
Abstract. The design of secure and efficient smart-card-based password authentication schemes remain...
One often hears the claim that smart cards are the solution to a number of security problems, includ...
This master thesis developed and tested the idea that smart cards are able to help mitigate security...
The evolution of smart card technology provides an interesting case study of the relationship and in...
Smart cards offer a wide variety of applications that could revolutionise payment transactions, redu...
In this paper we present different ways for an attacker to tamper with a digital signature scheme. ...
Smart cards are being toted as the secure means of payment for the future. But there are still some ...
The design of secure and efficient smart-card-based password authentication schemes remains a challe...
Smart cards are examples of advanced chip technology. They allow information transfer between the ca...
Abstract. We study the security requirements for remote authentication with password protected smart...
Modern smartcards, capable of sophisticated cryptography, provide a high assurance of tamper resista...
There is a need for assessing the security of smart cards by an independent third party, specially i...
This paper initiates the study of two specific security threats on smart-card-based password authent...
The User Centric Smart Card Ownership Model (UCOM) provides an open and dynamic smart card environme...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
Abstract. The design of secure and efficient smart-card-based password authentication schemes remain...