Author: Girard P. Giraud J.-L.
Publisher: Elsevier
ISSN: 1363-4127
Source: Information Security Technical Report, Vol.8, Iss.1, 2003-03, pp. : 55-66
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Overview about attacks on smart cards
By Rankl W.
Information Security Technical Report, Vol. 8, Iss. 1, 2003-03 ,pp. :
The adolescence of smart cards
Future Generation Computer Systems, Vol. 13, Iss. 1, 1997-07 ,pp. :
Lossless compression algorithms for smart cards: A progress report
By Dhem J.-F. Quisquater J.-J.
Future Generation Computer Systems, Vol. 13, Iss. 1, 1997-07 ,pp. :
Multi-application smart cards and encrypted data, processing
Future Generation Computer Systems, Vol. 13, Iss. 1, 1997-07 ,pp. :