MARC 닫기
00000cam u2200205Mi 4500
000001364597
20220215140201
m d
cr cnu---unuuu
190817s2019 xx o 000 0 engd
▼a GBB9E7419
▼2 bnb
▼a 019521111
▼2 Uk
▼a 9781000698350
▼a 1000698351
▼a 9780429345593
▼q (electronic bk.)
▼a 0429345593
▼q (electronic bk.)
▼a 9781000698718
▼q (electronic bk. ;
▼q Mobipocket)
▼a 1000698718
▼q (electronic bk. ;
▼q Mobipocket)
▼a 9781000699074
▼q (electronic bk. ;
▼q EPUB)
▼a 1000699072
▼q (electronic bk. ;
▼q EPUB)
▼z 9780367354404
▼q (hbk.)
▼a 10.1201/9780429345593
▼2 doi
▼a 2161388
▼b (N$T)
▼a (OCoLC)1111972842
▼a 9780429345593
▼b Taylor & Francis
▼a EBLCP
▼b eng
▼c EBLCP
▼d OCLCF
▼d TYFRS
▼d EBLCP
▼d OCLCQ
▼d UKMGB
▼d TYFRS
▼d UKAHL
▼d 248023
▼d N$T
▼e pn
▼a MAIN
▼a TK7895.S62
▼a COM
▼x 053000
▼2 bisacsh
▼a BUS
▼x 004000
▼2 bisacsh
▼a UR
▼2 bicssc
▼a 004.56
▼2 23
▼a Gupta, B. B.,
▼d 1982-
▼a Smart Card Security:
▼b Applications, Attacks, and Countermeasures.
▼a Milton:
▼b CRC Press LLC,
▼c 2019.
▼a 1 online resource (139 pages).
▼a text
▼b txt
▼2 rdacontent
▼a computer
▼b c
▼2 rdamedia
▼a online resource
▼b cr
▼2 rdacarrier
▼a Security, Privacy, and Trust in Mobile Communications Ser.
▼a 7.3.2. Quantum Smart Cards
▼a References6. Smart Card Communication Standards, Applications, and Development Tools; 6.1. Introduction; 6.2. Communication Standards; 6.3. Application Areas; 6.4. Open Source Tools; 6.4.1. Development Tools; 6.4.2. Middleware Libraries; 6.4.3. Key Stores; 6.4.4. Certificate Authority Software; 6.4.5. Testing Tools; 6.5. Conclusion; References; 7. Blockchain Integration and Quantum Smart Cards; 7.1. Introduction; 7.2. Blockchain Technology; 7.2.1. What Is Blockchain Technology?; 7.2.2. Smart Cards and Blockchain; 7.3. Quantum Smart Cards; 7.3.1. What Is Quantum Computing?
▼a Cover; Half Title; Title Page; Copyright Page; Dedication; Contents; List of Figures; List of Tables; Preface; Acknowledgment; About the Authors; 1. Smart Cards: Evolution, Statistics, and Forecasts; 1.1. Introduction; 1.2. Evolution of Smart Cards; 1.3. Related Statistics; 1.4. Industrial Forecasts; 1.5. Conclusion; References; 2. Classification of Smart Cards and How They Work; 2.1. Introduction; 2.2. Classification of Smart Cards; 2.2.1. Based on Capabilities or Configuration; 2.2.2. Based on Security Features; 2.2.3. Based on Communication Interface; 2.2.4. Based on Embedded Components
▼a 2.2.5. Based on the Nature of Application2.2.6. Programmable Cards; 2.3. How Smart Card-Based Systems Work; 2.4. Conclusion; References; 3. Hardware-Level Security Attacks and Logical Threats in Smart Cards; 3.1. Introduction; 3.2. Hardware-Level Security Attacks; 3.2.1. Invasive or Active Attacks; 3.2.2. Semi-Invasive Attacks; 3.2.3. Noninvasive Attacks; 3.3. Software-Level Security Attacks; 3.4. Countermeasures; 3.4.1. Countermeasures for Hardware-Level Security Attacks; 3.4.1.1. Countermeasures for Invasive Attacks; 3.4.1.2. Countermeasures for Semi-Invasive Attacks
▼a 3.4.1.3. Countermeasures for Noninvasive Attacks3.4.2. Countermeasures for Software-Level Security Attacks; 3.5. Conclusion; References; 4. Data Security in Smart Cards; 4.1. Introduction; 4.2. Types of Data-Level Security Attacks in Smart Cards; 4.2.1. Breach of Confidentiality; 4.2.2. Integrity Violation; 4.2.3. Availability Loss; 4.2.4. Other Concerns; 4.3. Countermeasures; 4.4. Conclusion; References; 5. Remote User Authentication Mechanisms in Smart Card-Based Applications; 5.1. Introduction; 5.2. Related Work; 5.3. Preliminaries; 5.3.1. Elliptic Curve Cryptography (ECC)
▼a 5.3.2. Collision-Resistant One-Way Hash Function5.3.3. Functional and Security Requirements; 5.3.4. Threat Assumptions; 5.4. Proposed Model; 5.4.1. System Entities; 5.4.2. System Model; 5.4.3. System Working; 5.5. Experiments and Results; 5.5.1. Prerequisites for the Experiments; 5.5.2. Modeling of the Authentication Mechanism in AVISPA-SPAN; 5.5.3. Policy Formulation in ACPT; 5.5.4. Results and Discussion; 5.6. Security Analysis; 5.6.1. Informal Security Analysis; 5.6.2. Formal Security Analysis; 5.6.3. Comparative Analysis; 5.7. Performance Analysis; 5.8. Conclusion and Future Scope
▼a Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart card-based systems. The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart card-based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart card-based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks. The book continues with a focus on the security attacks against remote user authentication mechanisms in smart card-based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart card-based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart card-based systems and applications. The final chapter explains the role of blockchain technology for securing smart card-based transactions and quantum cryptography for designing secure smart card-based algorithms. Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications.
▼a Dr. Brij B. Gupta received PhD degree from Indian Institute of Technology Roorkee, India in the area of Information and Cyber Security. In 2009, he was selected for Canadian Commonwealth Scholarship awarded by Government of Canada. He published more than 175 research papers in International Journals and Conferences of high repute including IEEE, Elsevier, ACM, Springer, Wiley, Taylor & Francis, Interscience, etc. He has visited several countries, i.e. Canada, Japan, Malaysia, Australia, China, Hong Kong, Italy, Spain, etc. to present his research work. His biography was selected and published in the 30th Edition of Marquis Who's Who in the World, 2012. Dr. Gupta also received Young Faculty research fellowship award from Ministry of Electronics and Information Technology, Government of India in 2017. He is also working as principal investigator of various R & D projects. He is serving as associate editor of IEEE Access, IEEE TII, Associate editor of IJICS, Interscience and Executive editor of IJITCA, Interscience, respectively. He is also serving as reviewer for journals of IEEE, Springer, Wiley, Taylor & Francis, etc. He is also serving as guest editor of various reputed Journals. He was also visiting researcher with University of Murcia (UMU), Spain, Deakin University, Australia and Yamaguchi University, Japan in 2018, 2017 and 2015, respectively. At present, Dr. Gupta is an Assistant Professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. His research interest include information security, cyber security, Cloud computing, Web security, intrusion detection, and phishing. Ms. Megha Quamara received her Master of Technology (M. Tech.) degree specialized in cyber security from National Institute of Technology (NIT), Kurukshetra, India, in 2018, and Bachelor of Technology (B. Tech.) degree in Computer Science and Engineering from University Institute of Engineering and Technology (UIET), Kurukshetra University, India, in 2015. Her research interests include security in Internet of Things (IoT) and Cloud computing, authentication in smart card technology, and data privacy.
▼a Print version record.
▼a Added to collection customer.56279.3
▼a Smart cards
▼x Security measures.
▼a Data encryption (Computer science)
▼a COMPUTERS
▼x Security
▼x General.
▼2 bisacsh
▼a BUSINESS & ECONOMICS
▼x Banks & Banking.
▼2 bisacsh
▼a COMPUTERS / Security / General
▼2 bisacsh
▼a BUSINESS & ECONOMICS / Banks & Banking
▼2 bisacsh
▼a Data encryption (Computer science)
▼2 fast
▼0 (OCoLC)fst00887935
▼a Smart cards
▼x Security measures.
▼2 fast
▼0 (OCoLC)fst01121550
▼a Electronic books.
▼a Quamara, Megha.
▼i Print version:
▼a Gupta, B.B.
▼t Smart Card Security : Applications, Attacks, and Countermeasures.
▼d Milton : CRC Press LLC, ©2019,
▼z 9780367354404
▼a Security, Privacy, and Trust in Mobile Communications series.
▼a NA000000
▼b 00000140
▼3 EBSCOhost
▼u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2161388
▼a Askews and Holts Library Services
▼b ASKH
▼n AH36352233
▼a ProQuest Ebook Central
▼b EBLB
▼n EBL5847326
▼a EBSCOhost
▼b EBSC
▼n 2161388
▼a 최영란
▼a eBook
▼a 92
▼b N$T
| 자료유형 : | eBook |
|---|---|
| ISBN : | 9781000698350 |
| ISBN : | 1000698351 |
| ISBN : | 9780429345593 |
| ISBN : | 0429345593 |
| ISBN : | 9781000698718 |
| ISBN : | 1000698718 |
| ISBN : | 9781000699074 |
| ISBN : | 1000699072 |
| ISBN : | |
| 기타표준부호 : | 10.1201/9780429345593 doi |
| 개인저자 : | Gupta, B. B., 1982- |
| 서명/저자사항 : | Smart Card Security: Applications, Attacks, and Countermeasures. |
| 발행사항 : | Milton: CRC Press LLC, 2019. |
| 형태사항 : | 1 online resource (139 pages). |
| 총서사항 : | Security, Privacy, and Trust in Mobile Communications Ser. |
| 일반주기 : | 7.3.2. Quantum Smart Cards |
| 서지주기 : | References6. Smart Card Communication Standards, Applications, and Development Tools; 6.1. Introduction; 6.2. Communication Standards; 6.3. Application Areas; 6.4. Open Source Tools; 6.4.1. Development Tools; 6.4.2. Middleware Libraries; 6.4.3. Key Stores; 6.4.4. Certificate Authority Software; 6.4.5. Testing Tools; 6.5. Conclusion; References; 7. Blockchain Integration and Quantum Smart Cards; 7.1. Introduction; 7.2. Blockchain Technology; 7.2.1. What Is Blockchain Technology?; 7.2.2. Smart Cards and Blockchain; 7.3. Quantum Smart Cards; 7.3.1. What Is Quantum Computing? |
| 내용주기 : | Cover; Half Title; Title Page; Copyright Page; Dedication; Contents; List of Figures; List of Tables; Preface; Acknowledgment; About the Authors; 1. Smart Cards: Evolution, Statistics, and Forecasts; 1.1. Introduction; 1.2. Evolution of Smart Cards; 1.3. Related Statistics; 1.4. Industrial Forecasts; 1.5. Conclusion; References; 2. Classification of Smart Cards and How They Work; 2.1. Introduction; 2.2. Classification of Smart Cards; 2.2.1. Based on Capabilities or Configuration; 2.2.2. Based on Security Features; 2.2.3. Based on Communication Interface; 2.2.4. Based on Embedded Components |
| 내용주기 : | 2.2.5. Based on the Nature of Application2.2.6. Programmable Cards; 2.3. How Smart Card-Based Systems Work; 2.4. Conclusion; References; 3. Hardware-Level Security Attacks and Logical Threats in Smart Cards; 3.1. Introduction; 3.2. Hardware-Level Security Attacks; 3.2.1. Invasive or Active Attacks; 3.2.2. Semi-Invasive Attacks; 3.2.3. Noninvasive Attacks; 3.3. Software-Level Security Attacks; 3.4. Countermeasures; 3.4.1. Countermeasures for Hardware-Level Security Attacks; 3.4.1.1. Countermeasures for Invasive Attacks; 3.4.1.2. Countermeasures for Semi-Invasive Attacks |
| 내용주기 : | 3.4.1.3. Countermeasures for Noninvasive Attacks3.4.2. Countermeasures for Software-Level Security Attacks; 3.5. Conclusion; References; 4. Data Security in Smart Cards; 4.1. Introduction; 4.2. Types of Data-Level Security Attacks in Smart Cards; 4.2.1. Breach of Confidentiality; 4.2.2. Integrity Violation; 4.2.3. Availability Loss; 4.2.4. Other Concerns; 4.3. Countermeasures; 4.4. Conclusion; References; 5. Remote User Authentication Mechanisms in Smart Card-Based Applications; 5.1. Introduction; 5.2. Related Work; 5.3. Preliminaries; 5.3.1. Elliptic Curve Cryptography (ECC) |
| 내용주기 : | 5.3.2. Collision-Resistant One-Way Hash Function5.3.3. Functional and Security Requirements; 5.3.4. Threat Assumptions; 5.4. Proposed Model; 5.4.1. System Entities; 5.4.2. System Model; 5.4.3. System Working; 5.5. Experiments and Results; 5.5.1. Prerequisites for the Experiments; 5.5.2. Modeling of the Authentication Mechanism in AVISPA-SPAN; 5.5.3. Policy Formulation in ACPT; 5.5.4. Results and Discussion; 5.6. Security Analysis; 5.6.1. Informal Security Analysis; 5.6.2. Formal Security Analysis; 5.6.3. Comparative Analysis; 5.7. Performance Analysis; 5.8. Conclusion and Future Scope |
| 요약 : | Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart card-based systems. The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart card-based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart card-based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks. The book continues with a focus on the security attacks against remote user authentication mechanisms in smart card-based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart card-based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart card-based systems and applications. The final chapter explains the role of blockchain technology for securing smart card-based transactions and quantum cryptography for designing secure smart card-based algorithms. Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications. |
| 일반주제명 : | Smart cards -- Security measures. -- |
| 일반주제명 : | Data encryption (Computer science) -- |
| 일반주제명 : | COMPUTERS -- Security -- General. -- |
| 일반주제명 : | BUSINESS & ECONOMICS -- Banks & Banking. -- |
| 일반주제명 : | COMPUTERS / Security / General -- |
| 일반주제명 : | BUSINESS & ECONOMICS / Banks & Banking -- |
| 일반주제명 : | Data encryption (Computer science) -- |
| 일반주제명 : | Smart cards -- Security measures. -- |
| 개인저자 : | Quamara, Megha. |
| 기타형태 저록 : | Print version: Gupta, B.B. Smart Card Security : Applications, Attacks, and Countermeasures. Milton : CRC Press LLC, ©2019, 9780367354404 |
| 언어 | 영어 |
| URL : |
|---|
서평쓰기