LEADER 06678nam 22007695 450 001 996466113903316 005 20200705202056.0 010 $a3-540-33312-6 024 7 $a10.1007/11733447 035 $a(CKB)1000000000232912 035 $a(SSID)ssj0000320061 035 $a(PQKBManifestationID)11937764 035 $a(PQKBTitleCode)TC0000320061 035 $a(PQKBWorkID)10360913 035 $a(PQKB)11574254 035 $a(DE-He213)978-3-540-33312-8 035 $a(MiAaPQ)EBC3067681 035 $a(PPN)123133297 035 $a(EXLCZ)991000000000232912 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSmart Card Research and Advanced Applications$b[electronic resource] $e7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings /$fedited by Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XII, 360 p.) 225 1 $aSecurity and Cryptology ;$v3928 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-33311-8 320 $aIncludes bibliographical references and index. 327 $aSmart Card Applications -- Design, Installation and Execution of a Security Agent for Mobile Stations -- Towards a Secure and Practical Multifunctional Smart Card -- Implementing Cryptography on TFT Technology for Secure Display Applications -- A Smart Card-Based Mental Poker System -- A Smart Card Solution for Access Control and Trust Management for Nomadic Users -- Smart Cards and Residential Gateways: Improving OSGi Services with Java Cards -- Zero Footprint Secure Internet Authentication Using Network Smart Card -- An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items -- Side Channel Attacks -- Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations -- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis -- Power Analysis to ECC Using Differential Power Between Multiplication and Squaring -- Smart Card Networking -- Designing Smartcards for Emerging Wireless Networks -- Smartcard Firewalls Revisited -- Multi-stage Packet Filtering in Network Smart Cards -- Cryptographic Protocols -- Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability -- SEA: A Scalable Encryption Algorithm for Small Embedded Applications -- Low-Cost Cryptography for Privacy in RFID Systems -- Optimal Use of Montgomery Multiplication on Smart Cards -- Off-Line Group Signatures with Smart Cards -- RFID Security -- Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags -- Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags -- MARP: Mobile Agent for RFID Privacy Protection -- Formal Methods -- Certifying Native Java Card API by Formal Refinement -- A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods -- Automatic Test Generation on a (U)SIM Smart Card. 330 $aSmart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT Security, which often appear sc- tered and only loosely connected. Smart card research unites them by providing a common goal: advancing the state of the art of designing and deploying small tokens to increase the security in Information Technology. CARDIS has a tradition of more than one decade, and has established itself asthepremier conferencefor researchresultsinsmartcardtechnology.As smart card research is unique, so is CARDIS; the conference successfully attracts a- demic and industrial researchers without compromising in either way. CARDIS accommodates applied research results as well as theoretical contributions that might or might not become practically relevant. The key to making such a m- ture attractive to both academia and industry is simple: quality of contributions and relevance to the overall subject. This year?s CARDIS made it easy to continue this tradition: we received 76 papers, nearly all of them relevant to the focus of CARDIS and presenting high-quality researchresults. The ProgramCommittee workedhard on selecting the best 25 papers to be presented at the conference. We are very grateful to the members of the Program Committee and the additional referees for generously spending their time on the di?cult task of assessing the value of submitted papers. Daniel Schreckling provided invaluable assistance in handling submissions, managing review reports and editing the proceedings. The assistance of Jordi Castell` a in handling practical aspects of the conference preparation is also greatly appreciated. 410 0$aSecurity and Cryptology ;$v3928 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aComputer communication systems 606 $aOperating systems (Computers) 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 0$aComputer communication systems. 615 0$aOperating systems (Computers). 615 14$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 676 $a005.82 702 $aDomingo-Ferrer$b Josep$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPosegga$b Joachim$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSchreckling$b Daniel$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aCARDIS 906 $aBOOK 912 $a996466113903316 996 $aSmart Card Research and Advanced Applications$9773154 997 $aUNISA