Smart Cards. In: Handbook of Technology Management. John Wiley & Sons (2009).:
Web Server on a SIM Card. Lecture Notes in Engineering and Computer Science. 2183, (2010).Abstract:
In this paper we discuss the integration of a web server on a SIM card and we attempt an analysis from a security, management, operation and personalization perspective. A brief representation of the Smart Card Web Server (SCWS) will take place, along with a use case that will help the reader to identify the way that a SCWS can be used in practice, before we reach to a final conclusion.
Smart card Platform-Fingerprinting. Smart Card Technology International. 78-82 (2006).:
Smart cards, tokens, security and applications. Springer (2008).:
Smart Cards: Communication Protocols and Applications. Handbook of Computer Networks. p. 251-268. John Wiley & Sons, Inc (2007). WebsiteAbstract:
This chapter contains sections titled: *Introduction *Communication Protocols *Interfacing with Smart Card Applications *Managing Multiple Applications *Application Security *Conclusion *Glossary *Cross References
Implementation of Temporally Aware Behaviour-Based Security in Smart Cards. 1st International Workshop on Secure Information Systems (SIS '06). , Wisla, Poland (2006).Abstract:
Behaviour-based security is a group of techniques used to monitor the activity of a system to identify abnormal behaviour and possibly an attack in progress. Smart cards present a constrained environment for behaviour-based security as there is no on-card source of time. A smart card applicable timestamping scheme, to provide secure time, is identified and used in a Java Card behaviour-based temporally aware security countermeasure, the functionality, implementation and operation of which is fully detailed in this work
Temporally Aware Behaviour-Based Security in Smart Cards. Computational Intelligence and Security, (CIC 2006) International Conference on. p. 604-608. IEEE Xplore, Guangzhou, China (2006).Abstract:
This work looks at behaviour-based security on smart cards and proposes enhancements to threshold detection using temporal awareness that could address emerging attacks (card-sharing and DPA). Temporal awareness requires knowledge of time of which a smart card has no internal source. This work discusses smart card time, behaviour-based security, details a contractual behaviour counter-measure which is implemented in JavaCard and detailed analysis is conducted
On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation. In: Security and Privacy in the Age of Ubiquitous Computing. p. 551-563. Springer US (2005). WebsiteAbstract:
The use of certificates for secure transactions in smart cards requires the existence of a secure and efficient revocation protocol. There are a number of existing protocols for online certificate revocation and validation, among which OCSP and SCVP are the most widely used. However there are not any real applications testing the efficiency of these protocols when run in a smart card, even though the advantages of such an implementation are promising. In this paper we examine the details of the implementation of these protocols, emphasising on the issues arisen from the limitations of the smart cards. We also discuss the performance results from the implementation of OCSP and SCVP in a multi-application smart card environment. Results from two different Java Card platforms are presented and analyzed.
An overview of the GlobalPlatform smart card specification. Information Security Technical Report. 8, 17-29 (2003). WebsiteAbstract:
Over the last five years smart card technology has changed considerably, both at the hardware and software level. More powerful microprocessors along with secure multi-application smart card operating systems provided the necessary functionality required by a large number of smart card applications. GlobalPlatform is considered among the leading multi-application smart card propositions that make an attempt to meet the requirements, for post issuance, issuer control, and interoperability. This article provides an overview of the GlobalPlatform card specification with an emphasis on its security functionality.
The case for a secure multi-application smart card operating system. In: Information Security Workshop. p. 188-197. Springer Berlin Heidelberg, Ishikawa, Japan (1997). WebsiteAbstract:
The idea of a multi-application smart card operating system is not a new one, but only recently the smart card industry is catching up with proper software and hardware architectures that contribute in the anticipated evolution. In this paper we survey some of the proposed software architectures and comment on their applicability and performance, along with investigating the entirely new demands imposed both in the smart card operating system and the application level. We also present a slightly different more decentralized view of a secure smart card multi-application operating system with some interesting new features
The Mobile Java Card Grid Project. 7th Edition of e-smart conference and demos. (2006).Abstract:
This position paper presents an overview of the Mobile Java Card Grid project that consists in setting up a grid like mobile infrastructure based on SIM cards. It combines the Java Card Grid infrastructure developed at the LaBRI, the SIM experience and tools of the Royal Holloway University of London, and some features of the MADNESS project developed at the XLIM.
Smart Cards: State-of-the-Art to Future Directions. In: IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2013). IEEE Computer Science, Athens, Greece (2013).Abstract:
The evolution of smart card technology provides an interesting case study of the relationship and interactions between security and business requirements. This paper maps out the milestones for smart card technology, discussing at each step the opportunities and challenges. The paper reviews recently proposed innovative ownership/management models and the security challenges associated with them. The paper concludes with a discussion of possible future directions for the technology, and the challenges these present.
Secure deployment of applications to fielded devices and smart cards. Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006. p. 195-206. INSTICC Press (2006).Abstract:
This work presents a process of deploying applications securely to fielded devices with smart cards whilst taking into consideration the possibility that the client device could be malicious. Advantages of the proposed process include, caching functionality upon the device, optimal use of resources, employment of nested security contexts whilst addressing fielded infrastructures and a homogeneous solution. This work outlines a targeted scenario, details existing malicious device activity and defines an attacker profile. Assumptions and requirements are drawn and analysis of the proposal and attack scenarios is conducted. Advantages and deployment scenarios are presented with an implementation the process using Java and specific standards.