You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Application, CARDIS 2010, held in Passau, Germany, in April 2010. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on mathematical algorithms; side channel analysis; systems; logical attacks; fault analysis; and privacy.
As information technology (IT) becomes specialized and fragmented, it is easy to lose sight that many topics have common threads and because of this, advances in one s- discipline may transmit to another. The presentation of results between different s- disciplines encourages this interchange for the advancement of IT as a whole. This volume comprises the selection of papers presented at the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010), composed of the following 11 international conferences: Advanced Software Engineering and Its Applications (ASEA 2010), Bio-Science and Bio- Technology (BSBT 2010), Control and Automation (CA 2010), Disaster Rec...
This book constitutes the thoroughly refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, CARDIS 2011, held in Leuven, Belgium, in September 2011. The 20 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on smart cards system security, invasive attacks, new algorithms and protocols, implementations and hardware security, non-invasive attacks, and Java card security.
This book highlights the latest research advances, new methods and development techniques, challenges and solutions from both theoretical and practical perspectives related to Ubiquitous and Pervasive Computing (UPC), with an emphasis on innovative, mobile and internet services. With the proliferation of wireless technologies and electronic devices, there is a rapidly growing interest in UPC, which makes it possible to create human-oriented computing environments in which computer chips are embedded in everyday objects and interact with the physical world. With UPC, people can go online even while moving around, thus enjoying nearly permanent access to their preferred services. Though it holds the potential to revolutionize our lives, UPC also poses a number of new research challenges. The book gathers the proceedings of the 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2017), held on June 28–June 30, 2017 in Torino, Italy.
Devenue un objet usuel du quotidien, la carte à puce fait intervenir de très nombreuses technologies informatiques. Cet ouvrage présente les concepts fondamentaux de la carte à puce et ses domaines d’applications. Il nous révèle les caractéristiques des systèmes d’exploitation embarqués, la manière de programmer les cartes dans le langage Java Card, les techniques mises en œuvre pour garantir leur sécurité face aux attaques physiques et logiques, ainsi que les méthodes formelles pour faire de la carte un objet de confiance. Le fonctionnement interne de la carte SIM dans les téléphones mobiles est décrit en détail. Le passeport biométrique et le paiement mobile sont traités à travers la technologie RFID/NFC qui ouvre la voie à de nouvelles applications du sans contact.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Smart Card Research and Advanced Applications, CARDIS 2012, held in Graz, Austria, in November 2012. The 18 revised full papers presented together with an invited talk were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on Java card security, protocols, side-channel attacks, implementations, and implementations for resource-constrained devices.
CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security Oct 30, 2017-Nov 03, 2017 Dallas, USA. You can view more information about this proceeding and all of ACM�s other published conference proceedings from the ACM Digital Library: http://www.acm.org/dl.
This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms.
Elliptic curves have been intensively studied in algebraic geometry and number theory. In recent years they have been used in devising efficient algorithms for factoring integers and primality proving, and in the construction of public key cryptosystems. Elliptic Curve Public Key Cryptosystems provides an up-to-date and self-contained treatment of elliptic curve-based public key cryptology. Elliptic curve cryptosystems potentially provide equivalent security to the existing public key schemes, but with shorter key lengths. Having short key lengths means smaller bandwidth and memory requirements and can be a crucial factor in some applications, for example the design of smart card systems. The book examines various issues which arise in the secure and efficient implementation of elliptic curve systems. Elliptic Curve Public Key Cryptosystems is a valuable reference resource for researchers in academia, government and industry who are concerned with issues of data security. Because of the comprehensive treatment, the book is also suitable for use as a text for advanced courses on the subject.
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are ...