Smart Cards , Tokens , Security and Applications ”
نویسنده
چکیده
This book provides an overview of secure chips and their applications. It mainly focuses on two types of tokens: contact and contactless. Except a brief introduction to Trusted Platform Modules (TPM), the book does not detail embedded IC or Hardware Secure Modules (HSM). The book depicts the major operating systems and environments (Java Card, Global Platform, MultOS, ...) and describes in details the application development environments for Java and SIM toolkit. The book explores different fields of application: mobile, banking, Pay TV and ID cards. A special focus is given to the mobile applications.
منابع مشابه
Hardware and Software Symbiosis Helps Smart Card Evolution
The need to manage and secure a rapidly growing information network has focused increasing attention on smart card technology. Over the past decade, smart cards evolved from offering basic memory to complex systems with chips that incorporate powerful processing units with dedicated peripherals. This evolution enabled a wide range of applications. Smart card applications include financial trans...
متن کاملIY2530 (Team Project in Security Computing) — Project Brief Secure SMS
You have been working for a consultancy company secureitall.com that specialises in the development of applications for mobile phones, PDAs and tokens (e.g. smart cards, USB tokens, etc). The company is relatively well known in its field and recognised for delivering high quality projects, always within the specified timeframes and at very competitive prices. In particular, it is well respected...
متن کاملThe Security Advantages of Hardware Tokens over Software Tokens for PKI Applications
.......................................................................................................3 Background ..................................................................................................4 Soft Tokens and Their Vulnerabilities ..........................................................5 Hardware Tokens and Smart Cards ......................................................
متن کاملThreat Modelling for Security Tokens in Web Applications
In the last couple of years, several European countries have started projects which intend to provide their citizens with electronic identity cards, driven by the European Directive on Electronic Signatures. One can expect that within a few years, these smart cards will be used in a wide variety of applications. In this paper, we describe the common threats that can be identified when using sec...
متن کاملTowards a Secure and Practical Multifunctional Smart Card
One of the most promising features of smart card technology is its potential to serve several applications using a single hardware token. Existing multifunctional smart cards, however, are either simple and suffer from serious limitations or they have a high complexity that is not justified for most applications. This paper describes a new scheme permitting different applications to flexibly sh...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009