04947nam 22008055 450 991014362800332120200706074658.03-540-45418-710.1007/3-540-45418-7(CKB)1000000000211549(SSID)ssj0000326687(PQKBManifestationID)11263374(PQKBTitleCode)TC0000326687(PQKBWorkID)10297472(PQKB)10093679(DE-He213)978-3-540-45418-2(MiAaPQ)EBC3073226(PPN)155201212(EXLCZ)99100000000021154920121227d2001 u| 0engurnn|008mamaatxtccrSmart Card Programming and Security International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001. Proceedings /edited by Isabelle Attali, Thomas Jensen1st ed. 2001.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2001.1 online resource (VIII, 260 p.) Lecture Notes in Computer Science,0302-9743 ;2140Bibliographic Level Mode of Issuance: Monograph3-540-42610-8 Includes bibliographical references at the end of each chapters and index.Invited Talk -- Protecting Consumer Security Devices -- Contributed Papers -- Jakarta: A Toolset for Reasoning about JavaCard -- Mechanising a Protocol for Smart Cards -- JCCM: Flexible Certificates for smartcards with Java Card -- Context Inference for Static Analysis of Java Card Object Sharing -- Automated Test and Oracle Generation for Smart-Card Applications -- An Internet Authorization Scheme Using Smart-Card-Based Security Kernels -- Turning Multi-applications Smart Cards Services Available from Anywhere at Anytime: A SOAP/MOM Approach in the Context of Java Cards -- An Operational Semantics of the Java Card Firewall -- CardS4: Modal Theorem Proving on Java Smartcards -- iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric -- SIMspeak - Towards an Open and Secure Application Platform for GSM SIMs -- On-Card Bytecode Verification for Java Card -- Towards a Full Formal Specification of the JavaCard API -- Protection Profiles and Generic Security Targets for Smart Cards as Secure Signature Creation Devices-Existing Solutions for the Payment Sector -- A Flexible Invocation Framework for Java Card -- ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards -- Information Leakage Attacks against Smart Card Implementations of the Elliptic Curve Digital Signature Algorithm -- Use of Biometrics for User Verification in Electronic Signature Smartcards -- Programming Internet Smartcard with XML Scripts -- Public-Key-Based High-Speed Payment (Electronic Money) System Using Contact-Less Smart Cards.Lecture Notes in Computer Science,0302-9743 ;2140Data encryption (Computer science)Computer engineeringComputer securitySpecial purpose computersComputer communication systemsOperating systems (Computers)Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Engineeringhttps://scigraph.springernature.com/ontologies/product-market-codes/I27000Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Special Purpose and Application-Based Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I13030Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Data encryption (Computer science).Computer engineering.Computer security.Special purpose computers.Computer communication systems.Operating systems (Computers).Cryptology.Computer Engineering.Systems and Data Security.Special Purpose and Application-Based Systems.Computer Communication Networks.Operating Systems.005.13/3Attali Isabelleedthttp://id.loc.gov/vocabulary/relators/edtJensen Thomasedthttp://id.loc.gov/vocabulary/relators/edtInternational Conference on Research in Smart CardsMiAaPQMiAaPQMiAaPQBOOK9910143628003321Smart Card Programming and Security1980335UNINA