Abstract is missing.
- Malicious Code on Java Card Smartcards: Attacks and CountermeasuresWojciech Mostowski, Erik Poll. 1-16 [doi]
- Static Program Analysis for Java Card AppletsVasilios Almaliotis, Alexandros Loizidis, Panagiotis Katsaros, Panagiotis Louridas, Diomidis Spinellis. 17-31 [doi]
- On Practical Information Flow Policies for Java-Enabled Multiapplication Smart CardsDorina Ghindici, Isabelle Simplot-Ryl. 32-47 [doi]
- New Differential Fault Analysis on AES Key Schedule: Two Faults Are EnoughChong Hee Kim, Jean-Jacques Quisquater. 48-60 [doi]
- DSA Signature Scheme Immune to the Fault CryptanalysisMaciej Nikodem. 61-73 [doi]
- A Black Hen Lays White EggsMasayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume. 74-88 [doi]
- Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate EquivalentsCarsten Rolfes, Axel Poschmann, Gregor Leander, Christof Paar. 89-103 [doi]
- Fast Hash-Based Signatures on Constrained DevicesSebastian Rohde, Thomas Eisenbarth, Erik Dahmen, Johannes Buchmann, Christof Paar. 104-117 [doi]
- Fraud Detection and Prevention in Smart Card Based Environments Using Artificial IntelligenceWael William Zakhari Malek, Keith Mayes, Constantinos Markantonakis. 118-132 [doi]
- The Trusted Execution Module: Commodity General-Purpose Trusted ComputingVictor Costan, Luis F. G. Sarmenta, Marten van Dijk, Srinivas Devadas. 133-148 [doi]
- Management of Multiple Cards in NFC-DevicesGerald Madlmayr, Oliver Dillinger, Josef Langer, Josef Scharinger. 149-161 [doi]
- Coupon Recalculation for the GPS Authentication SchemeGeorg Hofferek, Johannes Wolkerstorfer. 162-175 [doi]
- Provably Secure Grouping-Proofs for RFID TagsMike Burmester, Breno de Medeiros, Rossana Motta. 176-190 [doi]
- Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource DevicesPierre-Louis Cayrel, Philippe Gaborit, Emmanuel Prouff. 191-205 [doi]
- A Practical DPA Countermeasure with BDD ArchitectureToru Akishita, Masanobu Katagi, Yoshikazu Miyato, Asami Mizuno, Kyoji Shibutani. 206-217 [doi]
- SCARE of an Unknown Hardware Feistel ImplementationDenis Réal, Vivien Dubois, Anne-Marie Guilloux, Frédéric Valette, M hamed Drissi. 218-227 [doi]
- Evaluation of Java Card PerformanceSamia Bouzefrane, Julien Cordry, Hervé Meunier, Pierre Paradinas. 228-240 [doi]
- Application of Network Smart Cards to Citizens Identification SystemsJoaquín Torres Márquez, Mildrey Carbonell, Jesús Téllez Isaac, José María Sierra. 241-254 [doi]
- SmartPro: A Smart Card Based Digital Content Protection for Professional WorkflowAlain Durand, Marc Éluard, Sylvain Lelievre, Christophe Vincent. 255-266 [doi]
- A Practical Attack on the MIFARE ClassicGerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia. 267-282 [doi]
- A Chemical Memory SnapshotJörn-Marc Schmidt. 283-289 [doi]
- Recent Advances in Electronic Cash DesignAline Gouget. 290-293 [doi]