<--- Back to Details
First PageDocument Content
Information / Data / Ubiquitous computing / Java Card / Unified Modeling Language / Communications protocol / Card reader / Formal methods / Cryptographic protocol / Smart cards / Computing / ISO standards
Date: 2014-12-01 09:19:19
Information
Data
Ubiquitous computing
Java Card
Unified Modeling Language
Communications protocol
Card reader
Formal methods
Cryptographic protocol
Smart cards
Computing
ISO standards

Design for Trust: Security in M-Commerce Dominik Haneberg, Alexander Kreibich, Wolfgang Reif, Kurt Stenzel Lehrstuhl f¨ur Softwaretechnik und Programmiersprachen Fakult¨at f¨ur Informatik Universit¨at Augsburg D-8613

Add to Reading List

Source URL: www.isse.uni-augsburg.de

Download Document from Source Website

File Size: 163,91 KB

Share Document on Facebook

Similar Documents

Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards Wojciech Mostowski? and Pim Vullers?? Institute for Computing and Information Sciences, Digital Security group, Radboud University Nijmegen, The N

Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards Wojciech Mostowski? and Pim Vullers?? Institute for Computing and Information Sciences, Digital Security group, Radboud University Nijmegen, The N

DocID: 1vobi - View Document

Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings Lejla Batina1 , Jaap-Henk Hoepman1,2 , Bart Jacobs1 , Wojciech Mostowski1? , and Pim Vullers1?? 1

Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings Lejla Batina1 , Jaap-Henk Hoepman1,2 , Bart Jacobs1 , Wojciech Mostowski1? , and Pim Vullers1?? 1

DocID: 1vk0G - View Document

A Load Time Policy Checker for Open Multi-Application Smart Cards

A Load Time Policy Checker for Open Multi-Application Smart Cards

DocID: 1uyM1 - View Document

Side-Channel Analysis (SCA) – A comparative approach on smart cards, embedded systems, and high security solutions Rohde & Schwarz SIT GmbH Stuttgart/Germany

Side-Channel Analysis (SCA) – A comparative approach on smart cards, embedded systems, and high security solutions Rohde & Schwarz SIT GmbH Stuttgart/Germany

DocID: 1tWYx - View Document

ID2 -Monique Bakker - Contact-less DPA on smart cards must be considered under vulnerability assessment

ID2 -Monique Bakker - Contact-less DPA on smart cards must be considered under vulnerability assessment

DocID: 1tWKR - View Document