Smart card security and applications /:
This extensively updated, second edition offers the reader a current overview of the ways smart cards address the computer security issues of today's distributed applications.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston :
Artech House,
©2001.
|
Ausgabe: | 2nd ed. |
Schriftenreihe: | Artech House telecommunications library.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This extensively updated, second edition offers the reader a current overview of the ways smart cards address the computer security issues of today's distributed applications. |
Beschreibung: | 1 online resource (xviii, 305 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1580534082 9781580534086 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm49852722 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 020507s2001 maua ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d EXW |d OCLCQ |d TUU |d OCLCQ |d TNF |d MERUC |d OCLCQ |d OCLCF |d NLGGC |d OCLCO |d OCLCQ |d YDXCP |d OCLCQ |d MWM |d AGLDB |d OCLCQ |d SAV |d JBG |d QT7 |d OCLCA |d LUE |d VTS |d OCLCQ |d INT |d TOF |d CUY |d OCLCQ |d STF |d UKAHL |d K6U |d UMK |d UKEHC |d IEEEE |d OCLCO |d OCLCQ |d IOY |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 533449168 |a 702097688 |a 961595990 |a 962714435 |a 970727919 |a 1007391870 |a 1053051475 |a 1109175795 |a 1200086401 | ||
020 | |a 1580534082 |q (electronic bk.) | ||
020 | |a 9781580534086 |q (electronic bk.) | ||
035 | |a (OCoLC)49852722 |z (OCoLC)533449168 |z (OCoLC)702097688 |z (OCoLC)961595990 |z (OCoLC)962714435 |z (OCoLC)970727919 |z (OCoLC)1007391870 |z (OCoLC)1053051475 |z (OCoLC)1109175795 |z (OCoLC)1200086401 | ||
050 | 4 | |a TK7895.S62 |b .H46 2001eb | |
072 | 7 | |a COM |x 000000 |2 bisacsh | |
082 | 7 | |a 006 |2 21 | |
049 | |a MAIN | ||
100 | 1 | |a Hendry, Mike. | |
245 | 1 | 0 | |a Smart card security and applications / |c Mike Hendry. |
250 | |a 2nd ed. | ||
260 | |a Boston : |b Artech House, |c ©2001. | ||
300 | |a 1 online resource (xviii, 305 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Artech House telecommunications library | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |t The march of the card -- |t What is a chip card? -- |t Systems and procedures -- |t Market issues -- |t Problem Definition -- |t Perceptions -- |t ... and reality -- |t Calculating the risks: probabilities and odds -- |t Technical communication obstacles -- |t Specifying the Requirements -- |t Security criteria -- |t Quantifying the threat -- |t Standards -- |t Documenting the specification -- |t Technology -- |t Card Technology -- |t Visual features -- |t Magnetic stripe -- |t Enhancing security using complementary technologies -- |t Optical -- |t Smart cards -- |t Hybrids -- |t PCMCIA cards -- |t Others -- |t Encryption -- |t Cryptology overview and terminology -- |t Algorithms -- |t Keys -- |t Key management -- |t Public key infrastructures -- |t Computational requirements -- |t Cryptography export controls -- |t Passwords and Biometrics -- |t Personal identification types -- |t Requirements -- |t Components -- |t Passwords and PINs -- |t Behavioral -- |t Physiometric -- |t Biometrics and cards -- |t Chip Card Types and Characteristics -- |t Memory cards -- |t Microprocessor cards -- |t Contact and contactless -- |t Form factors -- |t Chip Card Security Features -- |t Carrier -- |t External security features -- |t Chip -- |t Contacts -- |t Antenna -- |t Mask -- |t Attacks and countermeasures -- |t Reliability factors -- |t Sample card specifications -- |t Multiapplication Operating Systems -- |t Functions -- |t Products -- |t System Components -- |t Reader -- |t Terminal -- |t Network -- |t Host systems -- |t Processes and Procedures -- |t Chip design -- |t Manufacture -- |t Personalization -- |t Issuance -- |t Loading/validation -- |t Use -- |t Lost, stolen, and misused cards. |
588 | 0 | |a Print version record. | |
520 | |a This extensively updated, second edition offers the reader a current overview of the ways smart cards address the computer security issues of today's distributed applications. | ||
650 | 0 | |a Smart cards |x Security measures. | |
650 | 6 | |a Cartes à mémoire |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x General. |2 bisacsh | |
650 | 7 | |a Smart cards |x Security measures |2 fast | |
758 | |i has work: |a Smart card security and applications (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYXgqKF6HxHjGppB6mgRJC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Hendry, Mike. |t Smart card security and applications. |b 2nd ed. |d Boston : Artech House, ©2001 |z 1580531563 |w (DLC) 2001018808 |
830 | 0 | |a Artech House telecommunications library. |0 http://id.loc.gov/authorities/names/n42002466 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=67425 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH20049972 | ||
938 | |a EBSCOhost |b EBSC |n 67425 | ||
938 | |a IEEE |b IEEE |n 9100018 | ||
938 | |a YBP Library Services |b YANK |n 2358594 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm49852722 |
---|---|
_version_ | 1816881599843663872 |
adam_text | |
any_adam_object | |
author | Hendry, Mike |
author_facet | Hendry, Mike |
author_role | |
author_sort | Hendry, Mike |
author_variant | m h mh |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK7895 |
callnumber-raw | TK7895.S62 .H46 2001eb |
callnumber-search | TK7895.S62 .H46 2001eb |
callnumber-sort | TK 47895 S62 H46 42001EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | The march of the card -- What is a chip card? -- Systems and procedures -- Market issues -- Problem Definition -- Perceptions -- ... and reality -- Calculating the risks: probabilities and odds -- Technical communication obstacles -- Specifying the Requirements -- Security criteria -- Quantifying the threat -- Standards -- Documenting the specification -- Technology -- Card Technology -- Visual features -- Magnetic stripe -- Enhancing security using complementary technologies -- Optical -- Smart cards -- Hybrids -- PCMCIA cards -- Others -- Encryption -- Cryptology overview and terminology -- Algorithms -- Keys -- Key management -- Public key infrastructures -- Computational requirements -- Cryptography export controls -- Passwords and Biometrics -- Personal identification types -- Requirements -- Components -- Passwords and PINs -- Behavioral -- Physiometric -- Biometrics and cards -- Chip Card Types and Characteristics -- Memory cards -- Microprocessor cards -- Contact and contactless -- Form factors -- Chip Card Security Features -- Carrier -- External security features -- Chip -- Contacts -- Antenna -- Mask -- Attacks and countermeasures -- Reliability factors -- Sample card specifications -- Multiapplication Operating Systems -- Functions -- Products -- System Components -- Reader -- Terminal -- Network -- Host systems -- Processes and Procedures -- Chip design -- Manufacture -- Personalization -- Issuance -- Loading/validation -- Use -- Lost, stolen, and misused cards. |
ctrlnum | (OCoLC)49852722 |
dewey-full | 006 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006 |
dewey-search | 006 |
dewey-sort | 16 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04316cam a2200529 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm49852722 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">020507s2001 maua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EXW</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TNF</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MWM</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SAV</subfield><subfield code="d">JBG</subfield><subfield code="d">QT7</subfield><subfield code="d">OCLCA</subfield><subfield code="d">LUE</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">TOF</subfield><subfield code="d">CUY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">UKAHL</subfield><subfield code="d">K6U</subfield><subfield code="d">UMK</subfield><subfield code="d">UKEHC</subfield><subfield code="d">IEEEE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">533449168</subfield><subfield code="a">702097688</subfield><subfield code="a">961595990</subfield><subfield code="a">962714435</subfield><subfield code="a">970727919</subfield><subfield code="a">1007391870</subfield><subfield code="a">1053051475</subfield><subfield code="a">1109175795</subfield><subfield code="a">1200086401</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580534082</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781580534086</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)49852722</subfield><subfield code="z">(OCoLC)533449168</subfield><subfield code="z">(OCoLC)702097688</subfield><subfield code="z">(OCoLC)961595990</subfield><subfield code="z">(OCoLC)962714435</subfield><subfield code="z">(OCoLC)970727919</subfield><subfield code="z">(OCoLC)1007391870</subfield><subfield code="z">(OCoLC)1053051475</subfield><subfield code="z">(OCoLC)1109175795</subfield><subfield code="z">(OCoLC)1200086401</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK7895.S62</subfield><subfield code="b">.H46 2001eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">006</subfield><subfield code="2">21</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hendry, Mike.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Smart card security and applications /</subfield><subfield code="c">Mike Hendry.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Boston :</subfield><subfield code="b">Artech House,</subfield><subfield code="c">©2001.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xviii, 305 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Artech House telecommunications library</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">The march of the card --</subfield><subfield code="t">What is a chip card? --</subfield><subfield code="t">Systems and procedures --</subfield><subfield code="t">Market issues --</subfield><subfield code="t">Problem Definition --</subfield><subfield code="t">Perceptions --</subfield><subfield code="t">... and reality --</subfield><subfield code="t">Calculating the risks: probabilities and odds --</subfield><subfield code="t">Technical communication obstacles --</subfield><subfield code="t">Specifying the Requirements --</subfield><subfield code="t">Security criteria --</subfield><subfield code="t">Quantifying the threat --</subfield><subfield code="t">Standards --</subfield><subfield code="t">Documenting the specification --</subfield><subfield code="t">Technology --</subfield><subfield code="t">Card Technology --</subfield><subfield code="t">Visual features --</subfield><subfield code="t">Magnetic stripe --</subfield><subfield code="t">Enhancing security using complementary technologies --</subfield><subfield code="t">Optical --</subfield><subfield code="t">Smart cards --</subfield><subfield code="t">Hybrids --</subfield><subfield code="t">PCMCIA cards --</subfield><subfield code="t">Others --</subfield><subfield code="t">Encryption --</subfield><subfield code="t">Cryptology overview and terminology --</subfield><subfield code="t">Algorithms --</subfield><subfield code="t">Keys --</subfield><subfield code="t">Key management --</subfield><subfield code="t">Public key infrastructures --</subfield><subfield code="t">Computational requirements --</subfield><subfield code="t">Cryptography export controls --</subfield><subfield code="t">Passwords and Biometrics --</subfield><subfield code="t">Personal identification types --</subfield><subfield code="t">Requirements --</subfield><subfield code="t">Components --</subfield><subfield code="t">Passwords and PINs --</subfield><subfield code="t">Behavioral --</subfield><subfield code="t">Physiometric --</subfield><subfield code="t">Biometrics and cards --</subfield><subfield code="t">Chip Card Types and Characteristics --</subfield><subfield code="t">Memory cards --</subfield><subfield code="t">Microprocessor cards --</subfield><subfield code="t">Contact and contactless --</subfield><subfield code="t">Form factors --</subfield><subfield code="t">Chip Card Security Features --</subfield><subfield code="t">Carrier --</subfield><subfield code="t">External security features --</subfield><subfield code="t">Chip --</subfield><subfield code="t">Contacts --</subfield><subfield code="t">Antenna --</subfield><subfield code="t">Mask --</subfield><subfield code="t">Attacks and countermeasures --</subfield><subfield code="t">Reliability factors --</subfield><subfield code="t">Sample card specifications --</subfield><subfield code="t">Multiapplication Operating Systems --</subfield><subfield code="t">Functions --</subfield><subfield code="t">Products --</subfield><subfield code="t">System Components --</subfield><subfield code="t">Reader --</subfield><subfield code="t">Terminal --</subfield><subfield code="t">Network --</subfield><subfield code="t">Host systems --</subfield><subfield code="t">Processes and Procedures --</subfield><subfield code="t">Chip design --</subfield><subfield code="t">Manufacture --</subfield><subfield code="t">Personalization --</subfield><subfield code="t">Issuance --</subfield><subfield code="t">Loading/validation --</subfield><subfield code="t">Use --</subfield><subfield code="t">Lost, stolen, and misused cards.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This extensively updated, second edition offers the reader a current overview of the ways smart cards address the computer security issues of today's distributed applications.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Smart cards</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cartes à mémoire</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Smart cards</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Smart card security and applications (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYXgqKF6HxHjGppB6mgRJC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Hendry, Mike.</subfield><subfield code="t">Smart card security and applications.</subfield><subfield code="b">2nd ed.</subfield><subfield code="d">Boston : Artech House, ©2001</subfield><subfield code="z">1580531563</subfield><subfield code="w">(DLC) 2001018808</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Artech House telecommunications library.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n42002466</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=67425</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH20049972</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">67425</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">IEEE</subfield><subfield code="b">IEEE</subfield><subfield code="n">9100018</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2358594</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm49852722 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:17Z |
institution | BVB |
isbn | 1580534082 9781580534086 |
language | English |
oclc_num | 49852722 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xviii, 305 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Artech House, |
record_format | marc |
series | Artech House telecommunications library. |
series2 | Artech House telecommunications library |
spelling | Hendry, Mike. Smart card security and applications / Mike Hendry. 2nd ed. Boston : Artech House, ©2001. 1 online resource (xviii, 305 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Artech House telecommunications library Includes bibliographical references and index. The march of the card -- What is a chip card? -- Systems and procedures -- Market issues -- Problem Definition -- Perceptions -- ... and reality -- Calculating the risks: probabilities and odds -- Technical communication obstacles -- Specifying the Requirements -- Security criteria -- Quantifying the threat -- Standards -- Documenting the specification -- Technology -- Card Technology -- Visual features -- Magnetic stripe -- Enhancing security using complementary technologies -- Optical -- Smart cards -- Hybrids -- PCMCIA cards -- Others -- Encryption -- Cryptology overview and terminology -- Algorithms -- Keys -- Key management -- Public key infrastructures -- Computational requirements -- Cryptography export controls -- Passwords and Biometrics -- Personal identification types -- Requirements -- Components -- Passwords and PINs -- Behavioral -- Physiometric -- Biometrics and cards -- Chip Card Types and Characteristics -- Memory cards -- Microprocessor cards -- Contact and contactless -- Form factors -- Chip Card Security Features -- Carrier -- External security features -- Chip -- Contacts -- Antenna -- Mask -- Attacks and countermeasures -- Reliability factors -- Sample card specifications -- Multiapplication Operating Systems -- Functions -- Products -- System Components -- Reader -- Terminal -- Network -- Host systems -- Processes and Procedures -- Chip design -- Manufacture -- Personalization -- Issuance -- Loading/validation -- Use -- Lost, stolen, and misused cards. Print version record. This extensively updated, second edition offers the reader a current overview of the ways smart cards address the computer security issues of today's distributed applications. Smart cards Security measures. Cartes à mémoire Sécurité Mesures. COMPUTERS General. bisacsh Smart cards Security measures fast has work: Smart card security and applications (Text) https://id.oclc.org/worldcat/entity/E39PCYXgqKF6HxHjGppB6mgRJC https://id.oclc.org/worldcat/ontology/hasWork Print version: Hendry, Mike. Smart card security and applications. 2nd ed. Boston : Artech House, ©2001 1580531563 (DLC) 2001018808 Artech House telecommunications library. http://id.loc.gov/authorities/names/n42002466 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=67425 Volltext |
spellingShingle | Hendry, Mike Smart card security and applications / Artech House telecommunications library. The march of the card -- What is a chip card? -- Systems and procedures -- Market issues -- Problem Definition -- Perceptions -- ... and reality -- Calculating the risks: probabilities and odds -- Technical communication obstacles -- Specifying the Requirements -- Security criteria -- Quantifying the threat -- Standards -- Documenting the specification -- Technology -- Card Technology -- Visual features -- Magnetic stripe -- Enhancing security using complementary technologies -- Optical -- Smart cards -- Hybrids -- PCMCIA cards -- Others -- Encryption -- Cryptology overview and terminology -- Algorithms -- Keys -- Key management -- Public key infrastructures -- Computational requirements -- Cryptography export controls -- Passwords and Biometrics -- Personal identification types -- Requirements -- Components -- Passwords and PINs -- Behavioral -- Physiometric -- Biometrics and cards -- Chip Card Types and Characteristics -- Memory cards -- Microprocessor cards -- Contact and contactless -- Form factors -- Chip Card Security Features -- Carrier -- External security features -- Chip -- Contacts -- Antenna -- Mask -- Attacks and countermeasures -- Reliability factors -- Sample card specifications -- Multiapplication Operating Systems -- Functions -- Products -- System Components -- Reader -- Terminal -- Network -- Host systems -- Processes and Procedures -- Chip design -- Manufacture -- Personalization -- Issuance -- Loading/validation -- Use -- Lost, stolen, and misused cards. Smart cards Security measures. Cartes à mémoire Sécurité Mesures. COMPUTERS General. bisacsh Smart cards Security measures fast |
title | Smart card security and applications / |
title_alt | The march of the card -- What is a chip card? -- Systems and procedures -- Market issues -- Problem Definition -- Perceptions -- ... and reality -- Calculating the risks: probabilities and odds -- Technical communication obstacles -- Specifying the Requirements -- Security criteria -- Quantifying the threat -- Standards -- Documenting the specification -- Technology -- Card Technology -- Visual features -- Magnetic stripe -- Enhancing security using complementary technologies -- Optical -- Smart cards -- Hybrids -- PCMCIA cards -- Others -- Encryption -- Cryptology overview and terminology -- Algorithms -- Keys -- Key management -- Public key infrastructures -- Computational requirements -- Cryptography export controls -- Passwords and Biometrics -- Personal identification types -- Requirements -- Components -- Passwords and PINs -- Behavioral -- Physiometric -- Biometrics and cards -- Chip Card Types and Characteristics -- Memory cards -- Microprocessor cards -- Contact and contactless -- Form factors -- Chip Card Security Features -- Carrier -- External security features -- Chip -- Contacts -- Antenna -- Mask -- Attacks and countermeasures -- Reliability factors -- Sample card specifications -- Multiapplication Operating Systems -- Functions -- Products -- System Components -- Reader -- Terminal -- Network -- Host systems -- Processes and Procedures -- Chip design -- Manufacture -- Personalization -- Issuance -- Loading/validation -- Use -- Lost, stolen, and misused cards. |
title_auth | Smart card security and applications / |
title_exact_search | Smart card security and applications / |
title_full | Smart card security and applications / Mike Hendry. |
title_fullStr | Smart card security and applications / Mike Hendry. |
title_full_unstemmed | Smart card security and applications / Mike Hendry. |
title_short | Smart card security and applications / |
title_sort | smart card security and applications |
topic | Smart cards Security measures. Cartes à mémoire Sécurité Mesures. COMPUTERS General. bisacsh Smart cards Security measures fast |
topic_facet | Smart cards Security measures. Cartes à mémoire Sécurité Mesures. COMPUTERS General. Smart cards Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=67425 |
work_keys_str_mv | AT hendrymike smartcardsecurityandapplications |