skip to main content
Skip header Section
Smart Card HandbookJune 1997
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
ISBN:978-0-471-96720-0
Published:01 June 1997
Pages:
440
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher:

The boom in smart card technology reflects the medium's broad solutions potential. Embedded with a sophisticated microprocessor, smart cards offer unparalleled memory capacity and data encryption capability. From providing secure access to the Internet and mobile radio networks to performing security-sensitive financial transactions in credit card schemes, the Electronic Purse and Pay TV systems, smart card technology is now a multi-billion dollar industry. The Smart Card Handbook presents a state-of-the-art overview of the technology from fundamental information processing through design, manufacture and operation of smart card schemes. Written in a highly accessible style the Smart Card Handbook meets the needs of both novice and expert. This is an essential reference for computer and electronics engineers and students in microchip design and security system development. For professionals developing smart card products, this unique reference will provide an invaluable insight to all the facets of this sophisticated technology.

Cited By

  1. ACM
    Mandal K, Fan X and Gong G (2016). Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices, ACM Transactions on Embedded Computing Systems (TECS), 15:1, (1-28), Online publication date: 20-Feb-2016.
  2. Wu Z, Chung Y, Lai F and Chen T (2012). A Password-Based User Authentication Scheme for the Integrated EPR Information System, Journal of Medical Systems, 36:2, (631-638), Online publication date: 1-Apr-2012.
  3. Rossudowski A, Venter H, Eloff J and Kourie D (2010). A security privacy aware architecture and protocol for a single smart card used for multiple services, Computers and Security, 29:4, (393-409), Online publication date: 1-Jun-2010.
  4. Govindan G, Balakrishnan S, Ratheendran R and Sivadasan S Real time security management using RFID, biometric and smart messages Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication, (282-285)
  5. Yi W, Kim S and Won D Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments Proceedings of the International Conference on Computational Science and Its Applications: Part II, (182-190)
  6. ACM
    Wendt M, Grumer M, Steger C, Weiss R, Neffe U and Muehlberger A System level power profile analysis and optimization for smart cards and mobile devices Proceedings of the 2008 ACM symposium on Applied computing, (1884-1888)
  7. Sgârciu V and Vlad M Smart card technology used in secured personal identification systems Proceedings of the 5th WSEAS international conference on Data networks, communications and computers, (131-136)
  8. ACM
    Azevedo A, Kejariwal A, Veidenbaum A and Nicolau A High performance annotation-aware JVM for Java cards Proceedings of the 5th ACM international conference on Embedded software, (52-61)
  9. Li F, Chen G, Kandemir M and Brooks R A compiler-based approach to data security Proceedings of the 14th international conference on Compiler Construction, (188-203)
  10. Koeune F and Standaert F A tutorial on physical security and side-channel attacks Foundations of Security Analysis and Design III, (78-108)
  11. ACM
    Ravi S, Raghunathan A, Kocher P and Hattangady S (2004). Security in embedded systems, ACM Transactions on Embedded Computing Systems (TECS), 3:3, (461-491), Online publication date: 1-Aug-2004.
  12. ACM
    Kocher P, Lee R, McGraw G, Raghunathan A and Ravi S Security as a new dimension in embedded system design Proceedings of the 41st annual Design Automation Conference, (753-760)
  13. Lee R and Liu J (2004). iJADE Web-Miner, IEEE Transactions on Knowledge and Data Engineering, 16:4, (461-473), Online publication date: 1-Apr-2004.
  14. ACM
    Gebotys C (2004). Design of secure cryptography against the threat of power-attacks in DSP-embedded processors, ACM Transactions on Embedded Computing Systems (TECS), 3:1, (92-113), Online publication date: 1-Feb-2004.
  15. ACM
    Blömer J, Otto M and Seifert J A new CRT-RSA algorithm secure against bellcore attacks Proceedings of the 10th ACM conference on Computer and communications security, (311-320)
  16. Fulcher J The use of smart devices in eHealth Proceedings of the 1st international symposium on Information and communication technologies, (27-32)
  17. ACM
    Benini L, Galati A, Macii A, Macii E and Poncino M Energy-efficient data scrambling on memory-processor interfaces Proceedings of the 2003 international symposium on Low power electronics and design, (26-29)
  18. Bucci M, Germani L, Luzzi R, Trifiletti A and Varanonuovo M (2003). A High-Speed Oscillator-Based Truly Random Number Source for Cryptographic Applications on a Smart Card IC, IEEE Transactions on Computers, 52:4, (403-409), Online publication date: 1-Apr-2003.
  19. Rila L and Mitchell C Security analysis of smartcard to card reader communications for biometric cardholder authentication Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5, (3-3)
  20. ACM
    Gebotys C Security-driven exploration of cryptography in DSP cores Proceedings of the 15th international symposium on System Synthesis, (80-85)
  21. Bolchini C and Schreiber F (2002). Smart card embedded information systems, Data & Knowledge Engineering, 41:2-3, (159-182), Online publication date: 1-Jun-2002.
  22. Markantonakis K Is the performance of smart card cryptographic functions the real bottleneck? Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge, (77-91)
  23. Hamann E, Henn H, Schäck T and Seliger F (2001). Securing e-business applications using smart cards, IBM Systems Journal, 40:3, (635-647), Online publication date: 1-Mar-2001.
  24. Sabatier D and Lartigue P (2019). The Use of the B Formal Method for the Design and the Validation of the Transaction Mechanism for Smart Card Applications, Formal Methods in System Design, 17:3, (245-272), Online publication date: 1-Dec-2000.
  25. ACM
    Matsuyama K and Fujimura K Distributed digital-ticket management for rights trading system Proceedings of the 1st ACM conference on Electronic commerce, (110-118)
  26. Macaire A and Carlier D A Personal Naming and Directory Service for UMTS Users Proceedings of the 6th International Conference on Intelligence and Services in Networks: Paving the Way for an Open Service Market, (250-262)
Contributors
  • Giesecke and Devrient GmbH (G+D)

Recommendations