... Softer Smartcards Usable Cryptographic Tokens with Secure Execution 4 Franz Ferdinand Brasser1, Sven Bugiel1, Atanas Filyanov2, Ahmad-Reza Sadeghi1,2,3, and Steffen Schulz1,2,4 1 System Security Lab, Technische Universität Darmstadt 2 ...
This book combines a cross-discipline overview of smart cards, tokens and related security and applications plus a technical reference to support further research and study.
... security and privacy of smart card based authentication systems that use X.509 credentials. It allows users to ... Softer smartcards - usable cryptographic tokens with secure execution. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol ...
... software and the devices provided by the middleware, the specific devices used in these experiments could just as well be replaced by any other cryptographic smart card or cryptographic USB token (so long as this replacement provided ...
... usable privacy and security , Mountain View , California , 2009 8. Kobsa A , Sonawalla R , Tsudik G , Uzun E , Wang ... execution of software modules ( e.g. , secure boot ) • Secure counting of events ( e.g. , usage counter for ...
... Security. Tokens. For the storage of high-quality cryptographic keys and for the execution of cryptographic operations, such as digitally signing a document, humans are dependent on computers. Especially for the protection of cryptographic ...
... tokens (labelled as “base” and “advanced” token). The base type of USB tokens integrates, in one object, both the ... cryptographic devices. Before executing the user test, the supervisor introduced each participant to 2 Part VI ...
... execution of malicious software, but makes all malicious software on a system evident in the system Quote. However, current TCG-based implementations of the Remote Attestation ... Token to Secure Mobile Agents 51 Local Attestation.
This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautiful illustrations.