A novel consumer-centric card management architecture and potential security issues
暂无分享,去创建一个
[1] Amy P. Felty,et al. Proceedings of the 10th International Conference on Theorem Proving in Higher Order Logics , 1997 .
[2] Keith Mayes,et al. Firewall Mechanism in a User Centric Smart Card Ownership Model , 2010, CARDIS.
[3] Keith Mayes,et al. A Privacy Preserving Application Acquisition Protocol , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[4] Keith Mayes,et al. Simulator Problem in User Centric Smart Card Ownership Model , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[5] Keith Mayes,et al. A Paradigm Shift in Smart Card Ownership Model , 2010, 2010 International Conference on Computational Science and Its Applications.
[6] Eric Vétillard,et al. Combined Attacks and Countermeasures , 2010, CARDIS.
[7] Keith Mayes,et al. Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture , 2012, ICICS.
[8] Erik Poll,et al. Malicious Code on Java Card Smartcards: Attacks and Countermeasures , 2008, CARDIS.
[9] Konstantinos Markantonakis,et al. Rethinking the Smart Card Technology, Invited Paper , 2014 .
[10] David A. Basin,et al. Verified Bytecode Model Checkers , 2002, TPHOLs.
[11] Ross J. Anderson. Can We Fix the Security Economics of Federated Authentication? , 2011, Security Protocols Workshop.
[12] Damien Sauveron,et al. Some security problems raised by open multiapplication smart cards , 2005 .
[13] Keith Mayes,et al. Location Based Application Availability , 2009, OTM Workshops.
[14] Jean-Louis Lanet,et al. Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings , 2010, CARDIS.
[15] Joachim Posegga,et al. Java Bytecode Verification by Model Checking , 1999, CAV.
[16] Keith Mayes,et al. A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[17] Damien Sauveron,et al. Multiapplication smart card: Towards an open smart card? , 2009, Inf. Secur. Tech. Rep..
[18] Patel,et al. Information Security: Theory and Practice , 2008 .
[19] Keith Mayes,et al. Remote Attestation Mechanism based on Physical Unclonable Functions , 2013 .
[20] Xavier Leroy. On-Card Bytecode Verification for Java Card , 2001, E-smart.
[21] Konstantinos Markantonakis,et al. Rethinking the Smart Card Technology , 2014, HCI.
[22] Keith Mayes,et al. A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism , 2010, SEC.
[23] Keith Mayes,et al. Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators , 2013, ICICS.
[24] Marc F. Witteman,et al. Reverse Engineering Java Card Applets Using Power Analysis , 2007, WISTP.
[25] Xavier Leroy,et al. Bytecode verification on Java smart cards , 2002 .
[26] Christian Steger,et al. A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards , 2013, WISTP.
[27] Keith Mayes,et al. Recovering from a Lost Digital Wallet , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[28] Christian Steger,et al. A defensive Java Card virtual machine to thwart fault attacks by microarchitectural support , 2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS).
[29] Keith Mayes,et al. Building the Bridges -- A Proposal for Merging Different Paradigms in Mobile NFC Ecosystem , 2012, 2012 Eighth International Conference on Computational Intelligence and Security.