The SCEAS System
Navigation Menu

Conferences in DBLP

CARDIS (cardis)
2006 (conf/cardis/2006)

  1. William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis
    Design, Installation and Execution of a Security Agent for Mobile Stations. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:1-15 [Conf]
  2. Idir Bakdi
    Towards a Secure and Practical Multifunctional Smart Card. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:16-31 [Conf]
  3. Petros Oikonomakos, Jacques J. A. Fournier, Simon W. Moore
    Implementing Cryptography on TFT Technology for Secure Display Applications. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:32-47 [Conf]
  4. Jordi Castellà-Roca, Josep Domingo-Ferrer, Francesc Sebé
    A Smart Card-Based Mental Poker System. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:48-61 [Conf]
  5. Daniel Díaz Sánchez, Andrés Marín López, Florina Almenárez Mendoza
    A Smart Card Solution for Access Control and Trust Management for Nomadic Users. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:62-77 [Conf]
  6. Juan Jesús Sánchez Sánchez, Daniel Díaz Sánchez, José Alberto Vigo Segura, Natividad Martínez Madrid, Ralf Seepold
    Smart Cards and Residential Gateways: Improving OSGi Services with Java Cards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:78-90 [Conf]
  7. Asad M. Ali
    Zero Footprint Secure Internet Authentication Using Network Smart Card. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:91-104 [Conf]
  8. Masayuki Terada, Kensaku Mori, Sadayuki Hongo
    An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:105-118 [Conf]
  9. Tae-Hyun Kim, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim
    Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:119-134 [Conf]
  10. Raphael C.-W. Phan, Sung-Ming Yen
    Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:135-150 [Conf]
  11. Toru Akishita, Tsuyoshi Takagi
    Power Analysis to ECC Using Differential Power Between Multiplication and Squaring. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:151-164 [Conf]
  12. Pascal Urien, Mesmin Dandjinou
    Designing Smartcards for Emerging Wireless Networks. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:165-178 [Conf]
  13. Henrich C. Pöhls, Joachim Posegga
    Smartcard Firewalls Revisited. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:179-191 [Conf]
  14. HongQian Karen Lu
    Multi-stage Packet Filtering in Network Smart Cards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:192-205 [Conf]
  15. Martin Schaffer, Peter Schartner
    Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:206-221 [Conf]
  16. François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater
    SEA: A Scalable Encryption Algorithm for Small Embedded Applications. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:222-236 [Conf]
  17. Benoît Calmels, Sébastien Canard, Marc Girault, Hervé Sibert
    Low-Cost Cryptography for Privacy in RFID Systems. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:237-251 [Conf]
  18. Arnaud Boscher, Robert Naciri
    Optimal Use of Montgomery Multiplication on Smart Cards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:252-262 [Conf]
  19. Jean-Bernard Fischer, Emmanuel Prouff
    Off-Line Group Signatures with Smart Cards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:263-277 [Conf]
  20. Tobias Lohmann, Matthias Schneider, Christoph Ruland
    Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:278-288 [Conf]
  21. Claude Castelluccia, Gildas Avoine
    Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:289-299 [Conf]
  22. Soo-Cheol Kim, Sang Soo Yeo, Sung Kwon Kim
    MARP: Mobile Agent for RFID Privacy Protection. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:300-312 [Conf]
  23. Quang Huy Nguyen, Boutheina Chetali
    Certifying Native Java API by Formal Refinement. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:313-328 [Conf]
  24. Alexandre Courbot, Mariela Pavlova, Gilles Grimaud, Jean-Jacques Vandewalle
    A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:329-344 [Conf]
  25. Céline Bigot, Alain Faivre, Christophe Gaston, Julien Simon
    Automatic Test Generation on a (U)SIM Smart Card. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:345-358 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002