Smart Card Research and Applications

Third International Conference, CARDIS’98, Louvain-la-Neuve, Belgium, September 14-16, 1998. Proceedings

Editors:

ISBN: 978-3-540-67923-3 (Print) 978-3-540-44534-0 (Online)

Table of contents (35 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Session 1: Electronic Money and Commerce

    1. No Access

      Book Chapter

      Pages 1-18

      User-Defined Divisibility of Ecash and a Practical Implementation

    2. No Access

      Book Chapter

      Pages 19-28

      An Operational Model of QuickPay

    3. No Access

      Book Chapter

      Pages 29-42

      Interoperable and Untraceable Debit-Tokens for Electronic Fee Collection

    4. No Access

      Book Chapter

      Pages 43-51

      The Banksys Signature Transport (BST) Protocol

  3. Session 2: The Java Card I

    1. No Access

      Book Chapter

      Pages 52-70

      The OpenCard Framework

    2. No Access

      Book Chapter

      Pages 71-84

      Smartcards – From Security Tokens to Intelligent Adjuncts

    3. No Access

      Book Chapter

      Pages 85-97

      Formal Proof of Smart Card Applets Correctness

  4. Session 3: The Java Card II

    1. No Access

      Book Chapter

      Pages 98-104

      Smart Card Payment over Internet with Privacy Protection

    2. No Access

      Book Chapter

      Pages 105-124

      Developing Smart Card-Based Applications Using Java Card

    3. No Access

      Book Chapter

      Pages 125-133

      The Performance of Modern Block Ciphers in JAVA

    4. No Access

      Book Chapter

      Pages 134-140

      Recoverable Persistent Memory for SmartCard

  5. Session 4: Attacks and Dealing with Speci c Threats

    1. No Access

      Book Chapter

      Pages 141-149

      Pirate Card Rejection

    2. No Access

      Book Chapter

      Pages 150-156

      Secure Authentication with Multiple Parallel Keys

    3. No Access

      Book Chapter

      Pages 157-166

      Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures

    4. No Access

      Book Chapter

      Pages 167-182

      A Practical Implementation of the Timing Attack

  6. Session 5: Authentication

    1. No Access

      Book Chapter

      Pages 183-192

      Techniques for Low Cost Authentication and Message Authentication

    2. No Access

      Book Chapter

      Pages 193-202

      Enhancing SESAMEV4 with Smart Cards

    3. No Access

      Book Chapter

      Pages 203-212

      How to Say “YES” with Smart Cards

  7. Session 6: Cryptography and Applications

    1. No Access

      Book Chapter

      Pages 213-220

      An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms

    2. No Access

      Book Chapter

      Pages 221-228

      Efficient Smart-Card Based Anonymous Fingerprinting

previous Page of 2