Abstract is missing.
- Design, Installation and Execution of a Security Agent for Mobile StationsWilliam G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis. 1-15 [doi]
- Towards a Secure and Practical Multifunctional Smart CardIdir Bakdi. 16-31 [doi]
- Implementing Cryptography on TFT Technology for Secure Display ApplicationsPetros Oikonomakos, Jacques J. A. Fournier, Simon W. Moore. 32-47 [doi]
- A Smart Card-Based Mental Poker SystemJordi Castellà-Roca, Josep Domingo-Ferrer, Francesc Sebé. 48-61 [doi]
- A Smart Card Solution for Access Control and Trust Management for Nomadic UsersDaniel Díaz Sánchez, Andrés Marín López, Florina Almenárez Mendoza. 62-77 [doi]
- Smart Cards and Residential Gateways: Improving OSGi Services with Java CardsJuan Jesús Sánchez Sánchez, Daniel Díaz Sánchez, José Alberto Vigo Segura, Natividad Martínez Madrid, Ralf Seepold. 78-90 [doi]
- Zero Footprint Secure Internet Authentication Using Network Smart CardAsad M. Ali. 91-104 [doi]
- An Optimistic NBAC-Based Fair Exchange Method for Arbitrary ItemsMasayuki Terada, Kensaku Mori, Sadayuki Hongo. 105-118 [doi]
- Generic Cryptanalysis of Combined Countermeasures with Randomized BSD RepresentationsTae-Hyun Kim, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim. 119-134 [doi]
- Amplifying Side-Channel Attacks with Techniques from Block Cipher CryptanalysisRaphael C.-W. Phan, Sung-Ming Yen. 135-150 [doi]
- Power Analysis to ECC Using Differential Power Between Multiplication and SquaringToru Akishita, Tsuyoshi Takagi. 151-164 [doi]
- Designing Smartcards for Emerging Wireless NetworksPascal Urien, Mesmin Dandjinou. 165-178 [doi]
- Smartcard Firewalls RevisitedHenrich Christopher Pöhls, Joachim Posegga. 179-191 [doi]
- Multi-stage Packet Filtering in Network Smart CardsHongQian Karen Lu. 192-205 [doi]
- Anonymous Authentication with Optional Shared Anonymity Revocation and LinkabilityMartin Schaffer, Peter Schartner. 206-221 [doi]
- SEA: A Scalable Encryption Algorithm for Small Embedded ApplicationsFrançois-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater. 222-236 [doi]
- Low-Cost Cryptography for Privacy in RFID SystemsBenoît Calmels, Sébastien Canard, Marc Girault, Hervé Sibert. 237-251 [doi]
- Optimal Use of Montgomery Multiplication on Smart CardsArnaud Boscher, Robert Naciri. 252-262 [doi]
- Off-Line Group Signatures with Smart CardsJean-Bernard Fischer, Emmanuel Prouff. 263-277 [doi]
- Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID TagsTobias Lohmann, Matthias Schneider, Christoph Ruland. 278-288 [doi]
- Noisy Tags: A Pretty Good Key Exchange Protocol for RFID TagsClaude Castelluccia, Gildas Avoine. 289-299 [doi]
- MARP: Mobile Agent for RFID Privacy ProtectionSoo-Cheol Kim, Sang-Soo Yeo, Sung Kwon Kim. 300-312 [doi]
- Certifying Native Java API by Formal RefinementQuang Huy Nguyen, Boutheina Chetali. 313-328 [doi]
- A Low-Footprint Java-to-Native Compilation Scheme Using Formal MethodsAlexandre Courbot, Mariela Pavlova, Gilles Grimaud, Jean-Jacques Vandewalle. 329-344 [doi]
- Automatic Test Generation on a (U)SIM Smart CardCéline Bigot, Alain Faivre, Christophe Gaston, Julien Simon. 345-358 [doi]