LEADER 05950nam 22009135 450 001 9910483369703321 005 20251226202543.0 010 $a1-280-38627-4 010 $a9786613564191 010 $a3-642-12510-7 024 7 $a10.1007/978-3-642-12510-2 035 $a(CKB)2560000000009140 035 $a(SSID)ssj0000446781 035 $a(PQKBManifestationID)11321216 035 $a(PQKBTitleCode)TC0000446781 035 $a(PQKBWorkID)10498052 035 $a(PQKB)10357076 035 $a(DE-He213)978-3-642-12510-2 035 $a(MiAaPQ)EBC3065216 035 $a(PPN)149073291 035 $a(BIP)29887657 035 $a(EXLCZ)992560000000009140 100 $a20100411d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSmart Card Research and Advanced Applications $e9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010, Proceedings /$fedited by Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (X, 239 p. 78 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v6035 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-12509-3 320 $aIncludes bibliographical references and index. 327 $aMathematical Algorithms -- The Polynomial Composition Problem in (?/n?)[X] -- Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension -- Secure Delegation of Elliptic-Curve Pairing -- Side Channel Analysis -- Side-Channel Leakage across Borders -- Designing a Side Channel Resistant Random Number Generator -- Simple Power Analysis on Exponentiation Revisited -- Atomicity Improvement for Elliptic Curve Scalar Multiplication -- Systems -- Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale -- Firewall Mechanism in a User Centric Smart Card Ownership Model -- Logical Attacks -- Combined Attacks and Countermeasures -- Attacks on Java Card 3.0 Combining Fault and Logical Attacks -- Fault Analysis -- Improved Fault Analysis of Signature Schemes -- When Clocks Fail: On Critical Paths and Clock Faults -- Privacy -- Modeling Privacy for Off-Line RFID Systems -- Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings -- On the Design and Implementation of an Efficient DAA Scheme. 330 $aTheseproceedingscontainthepapersselectedforpresentationatCARDIS 2010, the 9th IFIP Conference on Smart Card Research and Advanced Application hosted by the Institute of IT-Security and Security Law (ISL) of the University ofPassau,Germany.CARDISisorganizedbyIFIPWorkingGroupsWG8.8and WG 11.2. Since 1994, CARDIS has been the foremost international conference dedicated to smart card research and applications. Every second year leading researchers and practitioners meet to present new ideas and discuss recent - velopments in smart card technologies. Thefastevolutioninthe'eldofinformationsecurityrequiresadequatemeans for representing the user in human-machine interactions. Smart cards, and by extension smart devices with their processing power and their direct association with the user, are considered the ?rst choice for this purpose. A wide range of areas including hardware design, operating systems, systems modelling, cr- tography, and distributed systems contribute to this fast-growing technology. The submissions to CARDIS were reviewed by at least three members of the ProgramCommittee,followedbyatwo-weekdiscussionphaseheldelectronically, wherecommittee memberscouldcomment onall papersand allreviews.Finally, 16 papers were selected for presentation at CARDIS. There aremany volunteerswho o'ered their time and energy to put together the symposium and who deserve our acknowledgment. We want to thank all the members of the Program Committee and the external reviewers for their hard work in evaluating and discussing the submissions. We are also very grateful to JoachimPosegga,the GeneralChairof CARDIS 2010,andhisteam for thelocal conference management. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the proceedings stimulating. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v6035 606 $aComputer networks 606 $aUser interfaces (Computer systems) 606 $aHuman-computer interaction 606 $aComputers and civilization 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aAlgorithms 606 $aComputer Communication Networks 606 $aUser Interfaces and Human Computer Interaction 606 $aComputers and Society 606 $aCryptology 606 $aIT Operations 606 $aAlgorithms 615 0$aComputer networks. 615 0$aUser interfaces (Computer systems) 615 0$aHuman-computer interaction. 615 0$aComputers and civilization. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aElectronic data processing$xManagement. 615 0$aAlgorithms. 615 14$aComputer Communication Networks. 615 24$aUser Interfaces and Human Computer Interaction. 615 24$aComputers and Society. 615 24$aCryptology. 615 24$aIT Operations. 615 24$aAlgorithms. 676 $a004.6 701 $aGollmann$b Dieter$0634137 701 $aLanet$b Jean-Louis$01759766 701 $aIguchi-Cartigny$b Julien$01759767 712 12$aCARDIS (Conference) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483369703321 996 $aSmart Card Research and Advanced Applications$94522578 997 $aUNINA