1 |
Bovelander, Ernst, and Jan Pieters. "A Struc- tured Approach to Smart Card Security." In CardTech/SecurTech 96 Applications in Action. Atlanta, 1996
|
2 |
DoD Public Key Infrasructure and Key Management Infrastructure Token Protection Profile. Version 3.0, 2002
|
3 |
Krueger, Julie. "The Evolution of Personal Tokens in a More Secure Future." In CardTech/SecurTech 96 Applications in Action. Atlanta, 1996
|
4 |
Bovelander, Ernst. "Evaluations of Smart Card Based Security Systems-Is Your Smart Card Really Secure?" In CardTech/SecurTech 95 Strategies for the Millennium. Washington, D. C., 1995
|
5 |
Ayer, Ken. "Risk Management & Smart Cards." In CardTech/SecurTech 99 Gateway to Practical Innovation. Chicago, 1999
|
6 |
Kocher, Paul. "Differential Power Analysis and Problems in Applied Cryptography." In CardTechi SecurTech 99 Gateway to Practical Innovation. Chicago. 1999
|
7 |
Garon, Gilles. "Overview of Smart Card Security and Standards." In CardTech/SecurTech 95 Strategies for the Millennium. Washington, D.C., 1995
|
8 |
Johnson, Lance. "Smart Card Chip Security: Classification and Evaluation." In CardTech/SecurTech 97 The Art of Implementation. Orlando. 1997
|