![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Birch David
Publisher: Emerald Group Publishing Ltd
ISSN: 1066-2243
Source: Internet Research: Electronic Networking Applications and Policy, Vol.7, Iss.2, 1997-02, pp. : 116-119
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Software attacks on smart cards
Information Security Technical Report, Vol. 8, Iss. 1, 2003-03 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
The adolescence of smart cards
Future Generation Computer Systems, Vol. 13, Iss. 1, 1997-07 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
SourceOECD Science & Information Technology, Vol. 2009, Iss. 18, 2009-12 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Overview about attacks on smart cards
By Rankl W.
Information Security Technical Report, Vol. 8, Iss. 1, 2003-03 ,pp. :