


Остановите войну!
for scientists:


default search action
8th CARDIS 2008: London, UK
- Gilles Grimaud, François-Xavier Standaert
:
Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings. Lecture Notes in Computer Science 5189, Springer 2008, ISBN 978-3-540-85892-8 - Wojciech Mostowski, Erik Poll:
Malicious Code on Java Card Smartcards: Attacks and Countermeasures. 1-16 - Vasilios Almaliotis, Alexandros Loizidis, Panagiotis Katsaros
, Panagiotis Louridas, Diomidis Spinellis
:
Static Program Analysis for Java Card Applets. 17-31 - Dorina Ghindici, Isabelle Simplot-Ryl:
On Practical Information Flow Policies for Java-Enabled Multiapplication Smart Cards. 32-47 - Chong Hee Kim, Jean-Jacques Quisquater:
New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough. 48-60 - Maciej Nikodem:
DSA Signature Scheme Immune to the Fault Cryptanalysis. 61-73 - Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume:
A Black Hen Lays White Eggs. 74-88 - Carsten Rolfes
, Axel Poschmann, Gregor Leander
, Christof Paar:
Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents. 89-103 - Sebastian Rohde, Thomas Eisenbarth
, Erik Dahmen, Johannes Buchmann, Christof Paar:
Fast Hash-Based Signatures on Constrained Devices. 104-117 - Wael William Zakhari Malek, Keith Mayes, Constantinos Markantonakis:
Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence. 118-132 - Victor Costan, Luis F. G. Sarmenta, Marten van Dijk
, Srinivas Devadas:
The Trusted Execution Module: Commodity General-Purpose Trusted Computing. 133-148 - Gerald Madlmayr, Oliver Dillinger, Josef Langer, Josef Scharinger:
Management of Multiple Cards in NFC-Devices. 149-161 - Georg Hofferek, Johannes Wolkerstorfer:
Coupon Recalculation for the GPS Authentication Scheme. 162-175 - Mike Burmester, Breno de Medeiros, Rossana Motta:
Provably Secure Grouping-Proofs for RFID Tags. 176-190 - Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Prouff:
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices. 191-205 - Toru Akishita, Masanobu Katagi, Yoshikazu Miyato, Asami Mizuno, Kyoji Shibutani:
A Practical DPA Countermeasure with BDD Architecture. 206-217 - Denis Réal, Vivien Dubois, Anne-Marie Guilloux, Frédéric Valette, M'hamed Drissi:
SCARE of an Unknown Hardware Feistel Implementation. 218-227 - Samia Bouzefrane, Julien Cordry, Hervé Meunier, Pierre Paradinas:
Evaluation of Java Card Performance. 228-240 - Joaquín Torres Márquez, Mildrey Carbonell, Jesús Téllez Isaac, José María Sierra:
Application of Network Smart Cards to Citizens Identification Systems. 241-254 - Alain Durand, Marc Éluard, Sylvain Lelievre, Christophe Vincent:
SmartPro: A Smart Card Based Digital Content Protection for Professional Workflow. 255-266 - Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia:
A Practical Attack on the MIFARE Classic. 267-282 - Jörn-Marc Schmidt:
A Chemical Memory Snapshot. 283-289 - Aline Gouget:
Recent Advances in Electronic Cash Design. 290-293

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.