Sciweavers

35 search results - page 2 / 7
» CORSAIR: A SMART Card for Public Key Cryptosystems
Sort
View
CARDIS
1998
Springer
103views Hardware» more  CARDIS 1998»
13 years 10 months ago
Secure Personalization Using Proxy Cryptography
In this paper we describe new secure personalization schemes using proxy cryptography. We first introduce the context of a large scale smart card application such as an electronic ...
Pierre Girard
HICSS
2002
IEEE
132views Biometrics» more  HICSS 2002»
13 years 10 months ago
Secure Transmission of the Prescription Order Communication System Based on the Internet and the Public-Key Infrastructure Using
This research paper presents a new system's design and development of the prescription order communication system (POCS) based on the Internet between the hospital and the ph...
Won Jay Song, Byung-Ha Ahn
HICSS
2005
IEEE
161views Biometrics» more  HICSS 2005»
13 years 11 months ago
Data Assurance in a Conventional File Systems
The goal of this research is to find a mechanism to guarantee that a file stored in a conventional file system, on disk, has not been modified. Our proposal for achieving that goa...
Sasa Rudan, Aleksandra Kovacevic, Charles A. Milli...
SEC
2004
13 years 7 months ago
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards
: Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microproce...
Konstantinos Rantos, Constantinos Markantonakis
ARITH
2005
IEEE
13 years 11 months ago
Data Dependent Power Use in Multipliers
Recent research has demonstrated the vulnerability of certain smart card architectures to power and electromagnetic analysis when multiplier operations are insufficiently shielde...
Colin D. Walter, David Samyde