가야대학교 분성도서관

상단 글로벌/추가 메뉴

회원 로그인


자료검색

자료검색

상세정보

부가기능

Smart Card Security : Applications, Attacks, and Countermeasures. [electronic resource]

상세 프로파일

상세정보
자료유형E-Book
개인저자Gupta, B. B., 1982-
Quamara, Megha.
서명/저자사항Smart Card Security :Applications, Attacks, and Countermeasures.[electronic resource]
발행사항Milton : CRC Press LLC, 2019.
형태사항1 online resource (139 pages)
총서사항Security, Privacy, and Trust in Mobile Communications Ser.
소장본 주기Added to collection customer.56279.3
ISBN9781000698350
1000698351
9780429345593
0429345593
9781000698718
1000698718
9781000699074
1000699072

기타표준부호10.1201/9780429345593doi
일반주기 7.3.2. Quantum Smart Cards
서지주기References6. Smart Card Communication Standards, Applications, and Development Tools; 6.1. Introduction; 6.2. Communication Standards; 6.3. Application Areas; 6.4. Open Source Tools; 6.4.1. Development Tools; 6.4.2. Middleware Libraries; 6.4.3. Key Stores; 6.4.4. Certificate Authority Software; 6.4.5. Testing Tools; 6.5. Conclusion; References; 7. Blockchain Integration and Quantum Smart Cards; 7.1. Introduction; 7.2. Blockchain Technology; 7.2.1. What Is Blockchain Technology?; 7.2.2. Smart Cards and Blockchain; 7.3. Quantum Smart Cards; 7.3.1. What Is Quantum Computing?
내용주기Cover; Half Title; Title Page; Copyright Page; Dedication; Contents; List of Figures; List of Tables; Preface; Acknowledgment; About the Authors; 1. Smart Cards: Evolution, Statistics, and Forecasts; 1.1. Introduction; 1.2. Evolution of Smart Cards; 1.3. Related Statistics; 1.4. Industrial Forecasts; 1.5. Conclusion; References; 2. Classification of Smart Cards and How They Work; 2.1. Introduction; 2.2. Classification of Smart Cards; 2.2.1. Based on Capabilities or Configuration; 2.2.2. Based on Security Features; 2.2.3. Based on Communication Interface; 2.2.4. Based on Embedded Components
2.2.5. Based on the Nature of Application2.2.6. Programmable Cards; 2.3. How Smart Card-Based Systems Work; 2.4. Conclusion; References; 3. Hardware-Level Security Attacks and Logical Threats in Smart Cards; 3.1. Introduction; 3.2. Hardware-Level Security Attacks; 3.2.1. Invasive or Active Attacks; 3.2.2. Semi-Invasive Attacks; 3.2.3. Noninvasive Attacks; 3.3. Software-Level Security Attacks; 3.4. Countermeasures; 3.4.1. Countermeasures for Hardware-Level Security Attacks; 3.4.1.1. Countermeasures for Invasive Attacks; 3.4.1.2. Countermeasures for Semi-Invasive Attacks
3.4.1.3. Countermeasures for Noninvasive Attacks3.4.2. Countermeasures for Software-Level Security Attacks; 3.5. Conclusion; References; 4. Data Security in Smart Cards; 4.1. Introduction; 4.2. Types of Data-Level Security Attacks in Smart Cards; 4.2.1. Breach of Confidentiality; 4.2.2. Integrity Violation; 4.2.3. Availability Loss; 4.2.4. Other Concerns; 4.3. Countermeasures; 4.4. Conclusion; References; 5. Remote User Authentication Mechanisms in Smart Card-Based Applications; 5.1. Introduction; 5.2. Related Work; 5.3. Preliminaries; 5.3.1. Elliptic Curve Cryptography (ECC)
5.3.2. Collision-Resistant One-Way Hash Function5.3.3. Functional and Security Requirements; 5.3.4. Threat Assumptions; 5.4. Proposed Model; 5.4.1. System Entities; 5.4.2. System Model; 5.4.3. System Working; 5.5. Experiments and Results; 5.5.1. Prerequisites for the Experiments; 5.5.2. Modeling of the Authentication Mechanism in AVISPA-SPAN; 5.5.3. Policy Formulation in ACPT; 5.5.4. Results and Discussion; 5.6. Security Analysis; 5.6.1. Informal Security Analysis; 5.6.2. Formal Security Analysis; 5.6.3. Comparative Analysis; 5.7. Performance Analysis; 5.8. Conclusion and Future Scope
요약Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart card-based systems. The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart card-based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart card-based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks. The book continues with a focus on the security attacks against remote user authentication mechanisms in smart card-based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart card-based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart card-based systems and applications. The final chapter explains the role of blockchain technology for securing smart card-based transactions and quantum cryptography for designing secure smart card-based algorithms. Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications.
일반주제명Smart cards -- Security measures.
Data encryption (Computer science)
COMPUTERS -- Security -- General.
BUSINESS & ECONOMICS -- Banks & Banking.
COMPUTERS / Security / General
BUSINESS & ECONOMICS / Banks & Banking
Data encryption (Computer science)
Smart cards -- Security measures.
언어영어
기타형태 저록Print version:Gupta, B.B.Smart Card Security : Applications, Attacks, and Countermeasures.Milton : CRC Press LLC, 짤20199780367354404
대출바로가기https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2161388

소장정보

  • 소장정보

인쇄 인쇄

메세지가 없습니다
No. 등록번호 청구기호 소장처 도서상태 반납예정일 예약 서비스 매체정보
1 WE00019987 004.56 가야대학교/전자책서버(컴퓨터서버)/ 대출가능 인쇄 이미지  

서평

  • 서평

태그

  • 태그

나의 태그

나의 태그 (0)

모든 이용자 태그

모든 이용자 태그 (0) 태그 목록형 보기 태그 구름형 보기
 

퀵메뉴

대출현황/연장
예약현황조회/취소
자료구입신청
상호대차
FAQ
교외접속
사서에게 물어보세요
메뉴추가
quickBottom

카피라이터

  • 개인정보보호방침
  • 이메일무단수집거부

김해캠퍼스 | 621-748 | 경남 김해시 삼계로 208 | TEL:055-330-1033 | FAX:055-330-1032
			Copyright 2012 by kaya university Bunsung library All rights reserved.