ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
On construction of signcryption scheme for smart card security
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
◽
10.1109/isi.2015.7165948
◽
2015
◽
Author(s):
Jayaprakash Kar
◽
Daniyal M. Alghazzawi
Keyword(s):
Smart Card
◽
Signcryption Scheme
◽
Smart Card Security
Download Full-text
Related Documents
Cited By
References
Modelling Smart Card Security Protocols in SystemC TLM
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
◽
10.1109/euc.2010.102
◽
2010
◽
Cited By ~ 1
Author(s):
Aisha Bushager
◽
Mark Zwolinski
Keyword(s):
Smart Card
◽
Security Protocols
◽
Smart Card Security
Download Full-text
Smart Card Security
Smart Card Handbook
◽
10.1002/9780470660911.ch16
◽
2010
◽
pp. 667-734
◽
Cited By ~ 1
Keyword(s):
Smart Card
◽
Smart Card Security
Download Full-text
Smart Card Security
Studies in Computational Intelligence - Computational Intelligence in Information Assurance and Security
◽
10.1007/978-3-540-71078-3_8
◽
2007
◽
pp. 201-233
◽
Cited By ~ 6
Author(s):
Kostas Markantonakis
◽
Keith Mayes
◽
Michael Tunstall
◽
Damien Sauveron
◽
Fred Piper
Keyword(s):
Smart Card
◽
Smart Card Security
Download Full-text
Examining smart-card security under the threat of power analysis attacks
IEEE Transactions on Computers
◽
10.1109/tc.2002.1004593
◽
2002
◽
Vol 51
(5)
◽
pp. 541-552
◽
Cited By ~ 945
Author(s):
T.S. Messerges
◽
E.A. Dabbish
◽
R.H. Sloan
Keyword(s):
Smart Card
◽
Power Analysis
◽
Power Analysis Attacks
◽
Smart Card Security
Download Full-text
Improving smart card security using self-timed circuits
Proceedings Eighth International Symposium on Asynchronous Circuits and Systems ASYNC-02
◽
10.1109/async.2002.1000311
◽
2004
◽
Cited By ~ 69
Author(s):
S. Moore
◽
R. Anderson
◽
P. Cunningham
◽
R. Mullins
◽
G. Taylor
Keyword(s):
Smart Card
◽
Timed Circuits
◽
Smart Card Security
Download Full-text
New approaches to smart card security threats
Card Technology Today
◽
10.1016/s0965-2590(00)02015-6
◽
2000
◽
Vol 12
(2)
◽
pp. 12-15
Author(s):
Molly Faust
◽
Richard Tischler
◽
Christina Costa
◽
Colin Baptie
◽
Robin O’Kelly
◽
...
Keyword(s):
Smart Card
◽
Security Threats
◽
New Approaches
◽
Smart Card Security
Download Full-text
Smart Card Security ‘How Can We Be So Sure?’
State of the Art in Applied Cryptography - Lecture Notes in Computer Science
◽
10.1007/3-540-49248-8_15
◽
1998
◽
pp. 332-337
Author(s):
Ernst Bovelander
Keyword(s):
Smart Card
◽
Smart Card Security
Download Full-text
Smart Card Security
Management, Control and Evolution of IP Networks
◽
10.1002/9780470612118.ch16
◽
2010
◽
pp. 329-351
Author(s):
Vincent Guyot
Keyword(s):
Smart Card
◽
Smart Card Security
Download Full-text
Smart Card Security
Smart Cards, Tokens, Security and Applications
◽
10.1007/978-3-319-50500-8_9
◽
2017
◽
pp. 217-251
◽
Cited By ~ 4
Author(s):
Michael Tunstall
Keyword(s):
Smart Card
◽
Smart Card Security
Download Full-text
Making Sense of Smart Card Security Certifications
Smart Card Research and Advanced Applications
◽
10.1007/978-0-387-35528-3_13
◽
2000
◽
pp. 225-240
◽
Cited By ~ 1
Author(s):
Jason Reid
◽
Mark Looi
Keyword(s):
Smart Card
◽
Making Sense
◽
Security Certifications
◽
Smart Card Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close