Corpus ID: 15078581

Smart Cards in Hostile EnvironmentsHoward Gobio

@inproceedings{Smith1996SmartCI,
  title={Smart Cards in Hostile EnvironmentsHoward Gobio},
  author={Sean W. Smith and J. Tygar and Bennet and YeeCarnegie},
  year={1996}
}
One often hears the claim that smart cards are the solution to a number of security problems, including those arising in point-of-sale systems. In this paper, we characterize the minimal properties necessary for the secure smart card point-of-sale transactions. Many proposed systems fail to provide these properties: problems arise from failures to provide secure communication channels between the user and the smart card while operating in a potentially hostile environment (such as a point-of… Expand
1 Citations
Validation of smart card for securing digital documents
In the current scenario, most of the organizations go with the theme of digitalization to encourage paperless culture. All the organizations are reforming their systems to perform all theExpand

References

SHOWING 1-10 OF 25 REFERENCES
Using Secure Coprocessors
TLDR
This thesis addresses the distributed security problem by proposing the addition of a small, physically secure hardware module, a secure coprocessor, to standard workstations and PCs and demonstrates how security properties may be bootstrapped using cryptographic techniques from this central nucleus of security within a combined hardware/software architecture. Expand
Secure Coprocessors in Electronic Commerce Applications
  • Bennet S. Yee
  • Computer Science
  • USENIX Workshop on Electronic Commerce
  • 1995
TLDR
The abstract architecture of Dyad is described and a general discussion of secure coprocessor implementations of a variety of electronic commerce applications are discussed, including a critique of proposed solutions for point-of-sale electronic wallet systems. Expand
Trustee-based tracing extensions to anonymous cash and the making of anonymous change
TLDR
This work introduces the first electronic cash systems which incorporate trustee-based tracing but otherwise provably protect user anonymity, and expands on the provably anonymous electronic cash svstems of TB931 and lFY921. Expand
An Eecient Oo-line Electronic Cash System Based on the Representation Problem
We present a new o -line electronic cash system based on a problem, called the representation problem, of which little use has been made in literature thus far. Our system is the rst to be basedExpand
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
By carefully measuring the amount of time required tm perform private key operalions, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems.Expand
The ESPRIT Project CAFE - High Security Digital Payment Systems
TLDR
High security of all parties concerned, with the least possible requirements that they are forced to trust other parties (so-called multi-party security), should give legal certainty to everybody at all times. Expand
Authentication and Delegation with Smart-cards
The authentication of users in distributed systems poses special problems because users lack the ability to encrypt and decrypt. The same problems arise when users wish to delegate some of theirExpand
Security without identification: transaction systems to make big brother obsolete
The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations.
Notes from the second USENIX workshop on electronic commerce
These are notes taken from the Second USENIX Workshop on Electronic Commerce from November 1996. They record presentations and questions from this workshop.
Cryptanalysis in the presence of hard- ware faults
  • Personal Communication,
  • 1996
...
1
2
3
...