نتایج جستجو برای: smart card

تعداد نتایج: 95971  

2013
Guillaume Bouffard Bhagyalekshmy N. Thampi Jean-Louis Lanet

In smart card domain, attacks and countermeasures are advancing at a fast rate. In order to have a generic view of all the attacks, we propose to use a Fault Tree Analysis. This method used in safety analysis helps to understand and implement all the desirable and undesirable events existing in this domain. We apply this method to Java Card vulnerability analysis. We define the properties that ...

2011
Jorge Prado Casanovas Gauthier Van Damme

This paper presents a Java Card applet o ering the same functionality as a widely used contactless storage card. The goal is to provide a solution for secure and widely deployable data storage for smart phones. The applet provides an independent storage space for di erent applications with their own keys and con guration and is fully compatible with the MIFARE DES re Card EV1 technology. It can...

1999
Patrick C. K. Hung Kamalakar Karlapalem

Smart cards are replacing traditional magnetic cards for payment transactions. One of the main reasons is enhanced security capabilities that can be built in a smart card. With the high popularity of web technology, there is a trend towards smart cards being used as an electronic wallet for payment transactions on Internet. Most of the related work of smart card payment transactions concentrate...

1994
Audun Josang

There is a need for assessing the security of smart cards by an independent third party, specially if multi-application smart cards become reality. Intuitively, the methods to obtain this could be derived from the computer industry where security evaluation already is commonplace, but because of the special properties of smart cards, this seems very diicult. The article discusses the problems r...

1999
Tage Stabell-Kulø Ronny Arild Per Harald Myrvang

This paper presents a solution to how a smart card can be used to sign data in a hostile environment. In particular, how to use a smart card to make a signature on data when the machine to which the smart-card reader is attached can not be trusted. The problem is solved by means of a verification server together with a substitution table and a one-time pad; it is argued that lacking a trusted c...

2002
Jean-Louis LANET

In a previous paper [Lan-00] we explained that smart cards could be the ideal domain for applying formal methods. We said that the need of formal methods has three origins: mastering the complexity of the new operating systems, certifying at a high level a part of the smart card and reducing the cost of the test. We believed that these reasons were enough to introduce formal methods in the soft...

2010
Eduardo Lostal Nicola Dragoni

The Security-by-Contract (S×C) framework has recently been proposed to support applications evolution in multi-application smart cards. The key idea is based on the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy of a smart card. In this paper we address one of the key features needed to apply the S×C idea to a resou...

Journal: :IJTMCC 2014
Guillaume Bouffard Bhagyalekshmy N. Thampi Jean-Louis Lanet

Security and attacks are two sides of the same coin in the smart card industry. Smart cards are prone to different types of attacks to gain access to the assets stored in it and that can cause security issues. It is necessary to identify and exploit these attacks and implement appropriate countermeasures to mitigate their effects. Fault attacks are one among them. They can introduce abnormal be...

2004
Olaf Henniger Katrin Franke

This paper describes a biometric method for user authentication on smart cards. Smart cards are chip cards with the ability for data processing directly on the card. They are not only usable for storing biometric reference data, but biometric user authentication methods can also be performed on card in order to protect security-relevant functions or data on the cards. The biometric data under c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید