Google
×
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution from books.google.com
... Softer Smartcards Usable Cryptographic Tokens with Secure Execution 4 Franz Ferdinand Brasser1, Sven Bugiel1, Atanas Filyanov2, Ahmad-Reza Sadeghi1,2,3, and Steffen Schulz1,2,4 1 System Security Lab, Technische Universität Darmstadt 2 ...
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution from books.google.com
This book combines a cross-discipline overview of smart cards, tokens and related security and applications plus a technical reference to support further research and study.
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution from books.google.com
... security and privacy of smart card based authentication systems that use X.509 credentials. It allows users to ... Softer smartcards - usable cryptographic tokens with secure execution. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol ...
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution from books.google.com
... Softer smartcards - usable cryptographic tokens with secure execution . In : Keromytis , A.D. ( ed . ) FC 2012. LNCS , vol . 7397 , pp . 329–343 . Springer , Heidelberg ( 2012 ) 6. Brickell , E. , Camenisch , J. , Chen , L .: Direct ...
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution from books.google.com
... software and the devices provided by the middleware, the specific devices used in these experiments could just as well be replaced by any other cryptographic smart card or cryptographic USB token (so long as this replacement provided ...
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution from books.google.com
... usable privacy and security , Mountain View , California , 2009 8. Kobsa A , Sonawalla R , Tsudik G , Uzun E , Wang ... execution of software modules ( e.g. , secure boot ) • Secure counting of events ( e.g. , usage counter for ...
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution from books.google.com
... Security. Tokens. For the storage of high-quality cryptographic keys and for the execution of cryptographic operations, such as digitally signing a document, humans are dependent on computers. Especially for the protection of cryptographic ...
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution from books.google.com
... tokens (labelled as “base” and “advanced” token). The base type of USB tokens integrates, in one object, both the ... cryptographic devices. Before executing the user test, the supervisor introduced each participant to 2 Part VI ...
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution from books.google.com
... execution of malicious software, but makes all malicious software on a system evident in the system Quote. However, current TCG-based implementations of the Remote Attestation ... Token to Secure Mobile Agents 51 Local Attestation.
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution from books.google.com
This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautiful illustrations.