New Protocol Layer for Guaranteeing Trustworthy Smart Card Transaction
Conference paper
Keywords
Smart Card Advance Encryption Standard Protocol Layer Identity Authentication Hash Code
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
References
- PC/SC Workgroup, PC/SC Specification Version 2.0, Part 1: Introduction and Architecture Overview, August 2004. NEW PROTOCOL LAYER FOR GUARANTEEING TRUSTWORTHYGoogle Scholar
- Trusted Computing Group. https://www. trustedcomputinggroup.org/Google Scholar
- Microsoft Corporation, NGSCB. http://www.microsoft.com/resources/ngscb/default.mspxGoogle Scholar
- FIPS Publication 46-3, Data Encryption Standard. October 25, 1997.Google Scholar
- FIPS Publication 81, DES Modes of Operation. May 31, 1996.Google Scholar
- FIPS Publication 197, Advanced Encryption Standard. Novermber 26,2001.Google Scholar
- R. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 1978, 21(2): 120-126.MATHCrossRefMathSciNetGoogle Scholar
- RSA Laboratories, PKCS #1 V2.1, RSA Cryptography Standard. June 14, 2002.Google Scholar
- FIPS-113, Computer Data Authentication, May 30, 1985.Google Scholar
- FIPS-180-2, Secure Hash Standard (SHS), August 1, 2002.Google Scholar
- FIPS-186-2, Digital Signature Standard (DSS). January 27, 200.Google Scholar
- IETF RFC 1321, The MDS Message-Digest Algorithm, April 1992.Google Scholar
- W. Diffie, P. C. Van Oorschot, and M. J. Wiener, Authentication and authenticated key exchanges, Designs, Codes and Cryptography, 1992, (2): 107–125.CrossRefGoogle Scholar
Copyright information
© Springer 2006