|
Conferences in DBLP
Malicious Code on Java Card Smartcards: Attacks and Countermeasures. [Citation Graph (, )][DBLP]
Static Program Analysis for Java Card Applets. [Citation Graph (, )][DBLP]
On Practical Information Flow Policies for Java-Enabled Multiapplication Smart Cards. [Citation Graph (, )][DBLP]
New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough. [Citation Graph (, )][DBLP]
DSA Signature Scheme Immune to the Fault Cryptanalysis. [Citation Graph (, )][DBLP]
A Black Hen Lays White Eggs. [Citation Graph (, )][DBLP]
Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents. [Citation Graph (, )][DBLP]
Fast Hash-Based Signatures on Constrained Devices. [Citation Graph (, )][DBLP]
Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence. [Citation Graph (, )][DBLP]
The Trusted Execution Module: Commodity General-Purpose Trusted Computing. [Citation Graph (, )][DBLP]
Management of Multiple Cards in NFC-Devices. [Citation Graph (, )][DBLP]
Coupon Recalculation for the GPS Authentication Scheme. [Citation Graph (, )][DBLP]
Provably Secure Grouping-Proofs for RFID Tags. [Citation Graph (, )][DBLP]
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices. [Citation Graph (, )][DBLP]
A Practical DPA Countermeasure with BDD Architecture. [Citation Graph (, )][DBLP]
SCARE of an Unknown Hardware Feistel Implementation. [Citation Graph (, )][DBLP]
Evaluation of Java Card Performance. [Citation Graph (, )][DBLP]
Application of Network Smart Cards to Citizens Identification Systems. [Citation Graph (, )][DBLP]
SmartPro: A Smart Card Based Digital Content Protection for Professional Workflow. [Citation Graph (, )][DBLP]
A Practical Attack on the MIFARE Classic. [Citation Graph (, )][DBLP]
A Chemical Memory Snapshot. [Citation Graph (, )][DBLP]
Recent Advances in Electronic Cash Design. [Citation Graph (, )][DBLP]
|