Security for contactless smart cards using cryptography
From MaRDI portal
Publication:3053296
DOI10.1007/978-3-642-14478-3_56zbMATH Open1211.68186OpenAlexW1510992087MaRDI QIDQ3053296FDOQ3053296
Authors: Anuj Kundarap, Arpit Chhajlani, Rashu Singla, Mugdha Sawant, Milind Dere, Parikshiet Mahalle
Publication date: 28 October 2010
Published in: Recent Trends in Network Security and Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14478-3_56
Recommendations
Cited In (6)
- CryptoGraphics. Exploiting cards for security.
- Title not available (Why is that?)
- IC-Cards in High-Security Applications
- Why Johnny doesn't use two factor a two-phase usability study of the FIDO U2F security key
- Communication-computation trade-off in executing ECDSA in a contactless smartcard
- High-bandwidth encryption with low-bandwidth smartcards
This page was built for publication: Security for contactless smart cards using cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3053296)