Skip to main content
  • Conference proceedings
  • © 2008

Smart Card Research and Advanced Applications

8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5189)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CARDIS: International Conference on Smart Card Research and Advanced Applications

Conference proceedings info: CARDIS 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (22 papers)

  1. Front Matter

  2. Static Program Analysis for Java Card Applets

    • Vasilios Almaliotis, Alexandros Loizidis, Panagiotis Katsaros, Panagiotis Louridas, Diomidis Spinellis
    Pages 17-31
  3. New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough

    • Chong Hee Kim, Jean-Jacques Quisquater
    Pages 48-60
  4. A Black Hen Lays White Eggs

    • Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume
    Pages 74-88
  5. Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents

    • Carsten Rolfes, Axel Poschmann, Gregor Leander, Christof Paar
    Pages 89-103
  6. Fast Hash-Based Signatures on Constrained Devices

    • Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, Johannes Buchmann, Christof Paar
    Pages 104-117
  7. Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence

    • Wael William Zakhari Malek, Keith Mayes, Kostas Markantonakis
    Pages 118-132
  8. The Trusted Execution Module: Commodity General-Purpose Trusted Computing

    • Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, Srinivas Devadas
    Pages 133-148
  9. Management of Multiple Cards in NFC-Devices

    • Gerald Madlmayr, Oliver Dillinger, Josef Langer, Josef Scharinger
    Pages 149-161
  10. Coupon Recalculation for the GPS Authentication Scheme

    • Georg Hofferek, Johannes Wolkerstorfer
    Pages 162-175
  11. Provably Secure Grouping-Proofs for RFID Tags

    • Mike Burmester, Breno de Medeiros, Rossana Motta
    Pages 176-190
  12. Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices

    • Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Prouff
    Pages 191-205
  13. A Practical DPA Countermeasure with BDD Architecture

    • Toru Akishita, Masanobu Katagi, Yoshikazu Miyato, Asami Mizuno, Kyoji Shibutani
    Pages 206-217
  14. SCARE of an Unknown Hardware Feistel Implementation

    • Denis Réal, Vivien Dubois, Anne-Marie Guilloux, Frédéric Valette, Mhamed Drissi
    Pages 218-227
  15. Evaluation of Java Card Performance

    • Samia Bouzefrane, Julien Cordry, Hervé Meunier, Pierre Paradinas
    Pages 228-240
  16. Application of Network Smart Cards to Citizens Identification Systems

    • Joaquin Torres, Mildrey Carbonell, Jesus Tellez, Jose M. Sierra
    Pages 241-254
  17. SmartPro: A Smart Card Based Digital Content Protection for Professional Workflow

    • Alain Durand, Marc Éluard, Sylvain Lelievre, Christophe Vincent
    Pages 255-266

Other Volumes

  1. Smart Card Research and Advanced Applications

About this book

This book constitutes the refereed proceedings of the 8th International Conference on Smart Card Research and Advanced Applications, CARDIS 2008, held in London, UK, in September 2008. The 21 revised full papers presented, together with the abstract of one invited talk, were carefully reviewed and selected from 51 submissions. The papers deal with the various issues related to the use of small electronic tokens in the process of human-machine interactions. The conference scopes include numerous subfields such as networking, efficient implementations, physical security, biometrics, etc.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access