Skip to search formSkip to main contentSkip to account menu

Smart card

Known as: Chip card, Smart Card Web Server, Smart Kartela 
A smart card, chip card, or integrated circuit card (ICC) is any pocket-sized card that has embedded integrated circuits. Smart cards are made of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2009
Review
2009
List of Figures. List of Tables. Preface. Acknowledgements. 1 Ubiquitous Computing: Basics and Vision. 1.1 Living in a Digital… 
Highly Cited
2007
Highly Cited
2007
The Smart Card Automated Fare Collection (SCAFC) system is an Intelligent Transportation System that is becoming increasingly… 
Highly Cited
2006
Highly Cited
2006
In this article we describe an efficient AES software implementation that is well suited for 8-bit smart cards and resistant… 
Highly Cited
2004
Highly Cited
2004
A classical model is used for the power consumption of cryptographic devices. It is based on the Hamming distance of the data… 
Highly Cited
2004
Highly Cited
2004
  • C. Schnorr
  • Journal of Cryptology
  • 2004
  • Corpus ID: 10976365
We present a new public-key signature scheme and a corresponding authentication scheme that are based on discrete logarithms in a… 
Highly Cited
2003
Highly Cited
2003
The design of a high-speed IC random number source macro-cell, suitable for integration in a smart card microcontroller, is… 
Review
2002
Review
2002
This paper examines how monitoring power consumption signals might breach smart-card security. Both simple power analysis and… 
Highly Cited
2001
Highly Cited
2001
The Technology Acceptance Model (TAM) has received considerable research attention in the IS field over the past decade, placing… 
Review
1997
Review
1997
From the Publisher: The boom in smart card technology reflects the medium's broad solutions potential. Embedded with a… 
Highly Cited
1986
Highly Cited
1986
  • A. FiatA. Shamir
  • Annual International Cryptology Conference
  • 1986
  • Corpus ID: 4838652
In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the…