


default search action
8th CARDIS 2008: London, UK
- Gilles Grimaud, François-Xavier Standaert

:
Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings. Lecture Notes in Computer Science 5189, Springer 2008, ISBN 978-3-540-85892-8 - Wojciech Mostowski, Erik Poll:

Malicious Code on Java Card Smartcards: Attacks and Countermeasures. 1-16 - Vasilios Almaliotis, Alexandros Loizidis, Panagiotis Katsaros

, Panagiotis Louridas, Diomidis Spinellis
:
Static Program Analysis for Java Card Applets. 17-31 - Dorina Ghindici, Isabelle Simplot-Ryl:

On Practical Information Flow Policies for Java-Enabled Multiapplication Smart Cards. 32-47 - Chong Hee Kim, Jean-Jacques Quisquater:

New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough. 48-60 - Maciej Nikodem:

DSA Signature Scheme Immune to the Fault Cryptanalysis. 61-73 - Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume:

A Black Hen Lays White Eggs. 74-88 - Carsten Rolfes

, Axel Poschmann, Gregor Leander
, Christof Paar:
Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents. 89-103 - Sebastian Rohde, Thomas Eisenbarth

, Erik Dahmen, Johannes Buchmann, Christof Paar:
Fast Hash-Based Signatures on Constrained Devices. 104-117 - Wael William Zakhari Malek, Keith Mayes, Constantinos Markantonakis

:
Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence. 118-132 - Victor Costan, Luis F. G. Sarmenta, Marten van Dijk

, Srinivas Devadas:
The Trusted Execution Module: Commodity General-Purpose Trusted Computing. 133-148 - Gerald Madlmayr, Oliver Dillinger, Josef Langer, Josef Scharinger:

Management of Multiple Cards in NFC-Devices. 149-161 - Georg Hofferek, Johannes Wolkerstorfer:

Coupon Recalculation for the GPS Authentication Scheme. 162-175 - Mike Burmester, Breno de Medeiros, Rossana Motta:

Provably Secure Grouping-Proofs for RFID Tags. 176-190 - Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Prouff:

Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices. 191-205 - Toru Akishita, Masanobu Katagi, Yoshikazu Miyato, Asami Mizuno, Kyoji Shibutani:

A Practical DPA Countermeasure with BDD Architecture. 206-217 - Denis Réal, Vivien Dubois, Anne-Marie Guilloux, Frédéric Valette, M'hamed Drissi:

SCARE of an Unknown Hardware Feistel Implementation. 218-227 - Samia Bouzefrane, Julien Cordry, Hervé Meunier, Pierre Paradinas:

Evaluation of Java Card Performance. 228-240 - Joaquín Torres Márquez, Mildrey Carbonell, Jesús Téllez Isaac, José María Sierra:

Application of Network Smart Cards to Citizens Identification Systems. 241-254 - Alain Durand, Marc Éluard, Sylvain Lelievre, Christophe Vincent:

SmartPro: A Smart Card Based Digital Content Protection for Professional Workflow. 255-266 - Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia:

A Practical Attack on the MIFARE Classic. 267-282 - Jörn-Marc Schmidt:

A Chemical Memory Snapshot. 283-289 - Aline Gouget:

Recent Advances in Electronic Cash Design. 290-293

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














