Smart Card Research and Advanced Applications: 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT Security, which often appear sc- tered and only loosely connected. Smart card research unites them by providing a common goal: advancing the state of the art of designing and deploying small tokens to increase the security in Information Technology. CARDIS has a tradition of more than one decade, and has established itself asthepremier conferencefor researchresultsinsmartcardtechnology.As smart card research is unique, so is CARDIS; the conference successfully attracts a- demic and industrial researchers without compromising in either way. CARDIS accommodates applied research results as well as theoretical contributions that might or might not become practically relevant. The key to making such a m- ture attractive to both academia and industry is simple: quality of contributions and relevance to the overall subject. This year’s CARDIS made it easy to continue this tradition: we received 76 papers, nearly all of them relevant to the focus of CARDIS and presenting high-quality researchresults. The ProgramCommittee workedhard on selecting the best 25 papers to be presented at the conference. We are very grateful to the members of the Program Committee and the additional referees for generously spending their time on the di?cult task of assessing the value of submitted papers. Daniel Schreckling provided invaluable assistance in handling submissions, managing review reports and editing the proceedings. The assistance of Jordi Castell` a in handling practical aspects of the conference preparation is also greatly appreciated.

Author(s): William G. Sirett, John A. MacDonald, Keith Mayes, Konstantinos Markantonakis (auth.), Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling (eds.)
Series: Lecture Notes in Computer Science 3928 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006

Language: English
Pages: 360
Tags: Data Encryption; Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Operating Systems

Front Matter....Pages -
Design, Installation and Execution of a Security Agent for Mobile Stations....Pages 1-15
Towards a Secure and Practical Multifunctional Smart Card....Pages 16-31
Implementing Cryptography on TFT Technology for Secure Display Applications....Pages 32-47
A Smart Card-Based Mental Poker System....Pages 48-61
A Smart Card Solution for Access Control and Trust Management for Nomadic Users....Pages 62-77
Smart Cards and Residential Gateways: Improving OSGi Services with Java Cards....Pages 78-90
Zero Footprint Secure Internet Authentication Using Network Smart Card....Pages 91-104
An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items....Pages 105-118
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations....Pages 119-134
Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis....Pages 135-150
Power Analysis to ECC Using Differential Power Between Multiplication and Squaring....Pages 151-164
Designing Smartcards for Emerging Wireless Networks....Pages 165-178
Smartcard Firewalls Revisited....Pages 179-191
Multi-stage Packet Filtering in Network Smart Cards....Pages 192-205
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability....Pages 206-221
SEA: A Scalable Encryption Algorithm for Small Embedded Applications....Pages 222-236
Low-Cost Cryptography for Privacy in RFID Systems....Pages 237-251
Optimal Use of Montgomery Multiplication on Smart Cards....Pages 252-262
Off-Line Group Signatures with Smart Cards....Pages 263-277
Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags....Pages 278-288
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags....Pages 289-299
MARP: Mobile Agent for RFID Privacy Protection....Pages 300-312
Certifying Native Java Card API by Formal Refinement....Pages 313-328
A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods....Pages 329-344
Automatic Test Generation on a (U)SIM Smart Card....Pages 345-358
Back Matter....Pages -