Smart Cards , Tokens , Security and Applications ”

نویسنده

  • Konstantinos Markantonakis
چکیده

This book provides an overview of secure chips and their applications. It mainly focuses on two types of tokens: contact and contactless. Except a brief introduction to Trusted Platform Modules (TPM), the book does not detail embedded IC or Hardware Secure Modules (HSM). The book depicts the major operating systems and environments (Java Card, Global Platform, MultOS, ...) and describes in details the application development environments for Java and SIM toolkit. The book explores different fields of application: mobile, banking, Pay TV and ID cards. A special focus is given to the mobile applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware and Software Symbiosis Helps Smart Card Evolution

The need to manage and secure a rapidly growing information network has focused increasing attention on smart card technology. Over the past decade, smart cards evolved from offering basic memory to complex systems with chips that incorporate powerful processing units with dedicated peripherals. This evolution enabled a wide range of applications. Smart card applications include financial trans...

متن کامل

IY2530 (Team Project in Security Computing) — Project Brief Secure SMS

You have been working for a consultancy company secureitall.com that specialises in the development of applications for mobile phones, PDAs and tokens (e.g. smart cards, USB tokens, etc). The company is relatively well known in its field and recognised for delivering high quality projects, always within the specified timeframes and at very competitive prices. In particular, it is well respected...

متن کامل

The Security Advantages of Hardware Tokens over Software Tokens for PKI Applications

.......................................................................................................3 Background ..................................................................................................4 Soft Tokens and Their Vulnerabilities ..........................................................5 Hardware Tokens and Smart Cards ......................................................

متن کامل

Threat Modelling for Security Tokens in Web Applications

In the last couple of years, several European countries have started projects which intend to provide their citizens with electronic identity cards, driven by the European Directive on Electronic Signatures. One can expect that within a few years, these smart cards will be used in a wide variety of applications. In this paper, we describe the common threats that can be identified when using sec...

متن کامل

Towards a Secure and Practical Multifunctional Smart Card

One of the most promising features of smart card technology is its potential to serve several applications using a single hardware token. Existing multifunctional smart cards, however, are either simple and suffer from serious limitations or they have a high complexity that is not justified for most applications. This paper describes a new scheme permitting different applications to flexibly sh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009