๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Smart Card Security-Applications, Attacks, and Countermeasures

โœ Scribed by B.B. Gupta (Author); Megha Quamara (Author)


Publisher
CRC Press
Year
2019
Leaves
139
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart cardโ€“based systems.

The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart cardโ€“based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart cardโ€“based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks.

The book continues with a focus on the security attacks against remote user authentication mechanisms in smart cardโ€“based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart cardโ€“based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart cardโ€“based systems and applications. The final chapter explains the role of blockchain technology for securing smart cardโ€“based transactions and quantum cryptography for designing secure smart cardโ€“based algorithms.

Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications.

โœฆ Table of Contents


List of Figures

List of Tables

Preface

Acknowledgment

About the Authors

1 Smart Cards: Evolution, Statistics, and Forecasts

2 Classification of Smart Cards and How They Work

3 Hardware-Level Security Attacks and Logical Threats in Smart Cards

4 Data Security in Smart Cards

5 Remote User Authentication Mechanisms in Smart Cardโ€“Based Applications

6 Smart Card Communication Standards, Applications, and Development Tools

7 Blockchain Integration and Quantum Smart Cards

Index


๐Ÿ“œ SIMILAR VOLUMES


Smart Card Security: Applications, Attac
โœ B. B. Gupta; Megha Quamara ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› CRC Press ๐ŸŒ English

<strong><em>Smart Card Security: Applications, Attacks, and Countermeasures</em></strong>provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It disc

Smart Card Security: Applications, Attac
โœ B.B. Gupta, Megha Quamara ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› CRC Press/Routledge/Taylor & Francis Group ๐ŸŒ English

Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks as

Internet of Things Security-Principles,
โœ Brij B. Gupta (Author); Megha Quamara (Author) ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› CRC Press

<p>The Internet of Things (IoT), with its technological advancements and massive innovations, is building the idea of inter-connectivity among everyday life objects. With an explosive growth in the number of Internet-connected devices, the implications of the idea of IoT on enterprises, individuals,

Smart Card Security and Applications
โœ Mike Hendry ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Artech House Publishers ๐ŸŒ English

This extensively updated, second edition offers the reader a current overview of the ways smart cards address the computer security issues of today's distributed applications. New discussions on multi-application operating systems, computer networks, and the Internet are included to keep the reader

Bluetooth Security Attacks: Comparative
โœ Keijo Haataja, Konstantin Hyppรถnen, Sanna Pasanen, Pekka Toivanen (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Springer-Verlag Berlin Heidelberg ๐ŸŒ English

<p><p>Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literatu

Smart Cards, Tokens, Security and Applic
โœ Keith Mayes, Konstantinos Markantonakis ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Springer ๐ŸŒ English

<P><STRONG>Smart Cards, Tokens, Security and Applications provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the art work is written by contributing authors who are active researchers and acknowledged experts in their field. A single book