Smart Cards

Tunstall, M., Markantonakis, K., Sauveron, D., Mayes, K.: Smart Cards. In: Bidgoli, H. Handbook of Technology Management. John Wiley & Sons (2009).
Mayes, K., Markantonakis, K., Piper, F.: Smart card based authentication- Any future?. Computers & Security. 24, 188-191 (2005).Abstract
The need to be able to authenticate users, devices, data and processes is fundamental to the security of all distributed systems. User authentication tends to rely on at least one of the following: something you know, something you own, or some personal (biometric) characteristic. Frequently, Smart Cards play a central role in user authentication systems, independent of which factors are used. At a time when Smart Cards are enjoying resurgence in use and popularity, it is perhaps surprising to read an article that critically reviews their long-term future or, more specifically, their use for authentication. However, such an article is necessary to truly understand the range of benefits and limitations of Smart Card authentication and perhaps provoke discussion regarding the benefits and dangers of alternative solutions
Markantonakis, K., Mayes, K., Sauveron, D., Tunstall, M.: Smart Cards. Presented at the (2010). Website
Markantonakis, K., Mayes, K., Sauveron, D., Askoxylakis, I.G.: Overview of Security Threats for Smart Cards in the Public Transport Industry. In: jen Chung, Y. and Younas, M. Proceedings of the 2008 IEEE International Conference on e-Business Engineering. p. 506-513. IEEE Computer Society, Washington, DC, USA (2008). WebsiteAbstract
The advantages of utilising smart card technology, more importantly contactless smart cards, in the transport industry have long been realised. In this paper we provide an overview of the generic security issues and threats encountered whenever smart cards are utilised within the transport industry. To help highlight the issues, we analyse the different types of cards, their hosted applications, along with certain requirements on the relevant card issuing authorities.
Markantonakis, K.: Is the Performance of Smart Card Crytographic Functions the Real Bottleneck?. In: Dupuy, M. and Paradinas, P. Trusted Information. p. 77-91. Springer US (2001). WebsiteAbstract
It is generally believed that among the major delaying factors of smart card performance is the speed of the cryptographic algorithms. This is only partially true, as a number of other factors that add substantial delays to the overall performance of a smart card application should also be taken into account. In this paper we analyse the significance of these delaying factors. Furthermore, we also present some performance measurements of the two most widely used terminal application programming interfaces (APIs) and Java Cards. The aim of this work is to emphasise, both to smart card application developers and smart card technology researchers, the importance of these delaying factors and also to provide a reference point as to the performance of each API.
Mayes, K., Markantonakis, K.: Are we smart about security?. Information Security Technical Report. 8, 6-16 (2003). WebsiteAbstract
The introduction of new technologies and changes in behaviours has resulted in an erosion of personal contact and greater reliance on security systems and safeguards. The proliferation of independent security measures has generated an increasing amount of security information that must be stored and recalled by the consumer. Overall security can then be weakened as the consumer is inexpert at managing such data and really needs an integrated high security solution that is also easy to use. The multi-application smart card offers a promising solution, however, we may need to challenge some existing practices if we are to empower the citizen in the online world
Kyrillidis, L., Mayes, K., Markantonakis, K.: Smart Card Web Server. In: Ao, S.-I. and Gelman, L. Electrical Engineering and Applied Computing. p. 221-232. Springer Netherlands (2011). WebsiteAbstract
In this article (based on Kyrillidis L Mayes K Markantonakis K 2010 - Web server on a SIM card. Lecture notes in engineering and computer science: Proceedings of the World Congress on Engineering 2010 WCE 2010 30 June-2 July 2010 London UK pp 253-259) we discuss about the integration of a web server on a SIM card and we attempt an analysis from various perspectives (management operation security). A brief representation of the Smart Card Web Server (SCWS) will take place along with a use case that will help the reader to identify the way that an SCWS can be used in practice before we reach to a final conclusion.

Pages