Sciweavers

385 search results - page 45 / 77
» Advances in smart cards
Sort
View
ACISP
2003
Springer
14 years 1 months ago
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity
Abstract. This paper presents a robust software token that was developed to protect user’s digital identity by simple software-only techniques. This work is closely related to Ho...
Taekyoung Kwon
CAISE
2001
Springer
14 years 14 days ago
Techniques for Reactive System Design: The Tools in TRADE
Reactive systems are systems whose purpose is to maintain a certain desirable state of affairs in their environment, and include information systems, groupware, workflow systems,...
Roel Wieringa, David N. Jansen
ACSAC
2000
IEEE
14 years 12 days ago
Personal Security Environment on Palm PDA
Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all curre...
Margus Freudenthal, S. Heiberg, Jan Willemson
CHES
2000
Springer
114views Cryptology» more  CHES 2000»
14 years 9 days ago
Montgomery Exponentiation with no Final Subtractions: Improved Results
The Montgomery multiplication is commonly used as the core algorithm for cryptosystems based on modular arithmetic. With the advent of new classes of attacks (timing attacks, power...
Gaël Hachez, Jean-Jacques Quisquater
SP
1998
IEEE
14 years 6 days ago
Stack and Queue Integrity on Hostile Platforms
When computationally intensive tasks have to be carried out on trusted, but limited, platforms such as smart cards, it becomes necessary to compensate for the limited resources me...
Premkumar T. Devanbu, Stuart G. Stubblebine