SC 2: Secure Communication over Smart Cards
From MaRDI portal
Recommendations
- An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards
- Secure many-to-one symbol transmission for implementation on smart cards
- Communication-computation trade-off in executing ECDSA in a contactless smartcard
- Implementing cryptographic pairings on accumulator based smart card architectures
- Two Efficient and Secure Authentication Schemes Using Smart Cards
Cited in
(8)- scientific article; zbMATH DE number 1848379 (Why is no real title available?)
- scientific article; zbMATH DE number 1848383 (Why is no real title available?)
- Secure application execution in mobile devices
- Application-binding protocol in the user centric smart card ownership model
- Matching in security-by-contract for mobile code
- Cryptanalysis of GlobalPlatform secure channel protocols
- scientific article; zbMATH DE number 1706334 (Why is no real title available?)
- Efficient and secure stored-value cards with leakage resilience
This page was built for publication: SC 2: Secure Communication over Smart Cards
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889815)