{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:54:46Z","timestamp":1725544486496},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333111"},{"type":"electronic","value":"9783540333128"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11733447_2","type":"book-chapter","created":{"date-parts":[[2006,3,13]],"date-time":"2006-03-13T00:52:57Z","timestamp":1142211177000},"page":"16-31","source":"Crossref","is-referenced-by-count":2,"title":["Towards a Secure and Practical Multifunctional Smart Card"],"prefix":"10.1007","author":[{"given":"Idir","family":"Bakdi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Anderson, R., Kuhn, M.: Tamper Resistance - a Cautionary Note. In: Proceedings of the Second USENIX Workshop on Electronic Commerce, Oakland, CA, USA, pp. 1\u201311 (1996)"},{"issue":"4","key":"2_CR2","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1109\/TC.2003.1190581","volume":"52","author":"M. Bucci","year":"2003","unstructured":"Bucci, M., Germani, L., Luzzi, R., Trifiletti, A., Varanonuovo, M.: A High Speed Oscillator-Based Truly Random Number Source for Cryptographic Applications on a Smart Card IC. IEEE Transactions on Computers\u00a052(4), 403\u2013409 (2003)","journal-title":"IEEE Transactions on Computers"},{"key":"2_CR3","unstructured":"Chadwick, D.W.: The X.509 Privilege Management Infrastructure. In: Proceedings of the NATO Advanced Networking Workshop on Advanced Security Technologies in Networking, Bled, Slovenia (2003)"},{"key":"2_CR4","unstructured":"Chan, S.-C.: Infrastructure of Multi-Application Smart Card (in the concerns of access control) (1997), \n \n http:\/\/home.hkstar.com\/~alanchan\/papers\/multiApplicationSmartCard\/\n \n \n download 2005-02-28"},{"key":"2_CR5","volume-title":"Java Card Technology for Smart Cards: Architecture and Programmer\u2019s Guide","author":"Z. Chen","year":"2000","unstructured":"Chen, Z.: Java Card Technology for Smart Cards: Architecture and Programmer\u2019s Guide. Addison-Wesley Professional, Amsterdam (2000)"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/3-540-45418-7_9","volume-title":"Smart Card Programming and Security","author":"M. \u00c9luard","year":"2001","unstructured":"\u00c9luard, M., Jensen, T., Denne, E.: An Operational Semantics of the Java Card Firewall. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol.\u00a02140, pp. 95\u2013110. Springer, Heidelberg (2001)"},{"key":"2_CR7","unstructured":"European Union (ed.): Information Technology Security Evaluation Criteria (ITSEC), \n \n http:\/\/www.bsi.de\/zertifiz\/itkrit\/itsec-en.pdf\n \n \n download 2005-02-28"},{"key":"2_CR8","unstructured":"Grimaud, G., Vandewalle, J.-J.: Introducing research issues for next generation Java-based smart card platforms. In: Proceedings of the Smart Objects Conference (SOC), Grenoble, France, pp. 138\u2013141 (2003)"},{"key":"2_CR9","unstructured":"MAOSCO, Ltd: MULTOS (2004) download 2004-06-07, \n \n http:\/\/www.multos.com"},{"key":"2_CR10","unstructured":"MasterCard International: Mondex (2004), \n \n http:\/\/www.mondex.com\n \n \n download 2004-06-07"},{"key":"2_CR11","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"2_CR12","unstructured":"Niwano, E., Hatanaka, M., Hashimoto, J., Yamamoto, S.: Early Experience of a Dynamic Application Downloading Platform for Multi-Application Smart Cards. In: Proceedings of the Fifth Joint Conference on Knowledge-Based Software Engineering (JCKBSE) Maribor, Slovenia (2002)"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/BFb0055863","volume-title":"Computer Security \u2013 ESORICS 98","author":"J. Posegga","year":"1998","unstructured":"Posegga, J., Vogt, H.: Byte Code Verification for Java Smart Cards Based on Model Checking. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 175\u2013190. Springer, Heidelberg (1998)"},{"key":"2_CR14","volume-title":"Aufbau - Funktionsweise - Einsatz von Smart Cards","author":"W. Rankl","year":"2002","unstructured":"Rankl, W., Effing, W.: Handbuch der Chipkarten: Aufbau - Funktionsweise - Einsatz von Smart Cards. Hanser Verlag, Munich (2002)"},{"issue":"1","key":"2_CR15","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Transactions on Information and System Security"},{"key":"2_CR16","volume-title":"Applied cryptography: protocols, algorithms and source code in C","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied cryptography: protocols, algorithms and source code in C. John Wiley & Sons, Inc., New York (1996)"},{"key":"2_CR17","unstructured":"Schneier, B., Shostack, A.: Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards. In: Proceedings of the USENIX Workshop on Smart Card Technology, pp. 175\u2013185. USENIX Press (1999)"},{"key":"2_CR18","unstructured":"Siveroni, I., Jensen, T., Eluard, M.: A Formal Specification of the Java Card Firewall. In: Nordic Workshop on Secure IT-Systems (2001)"},{"key":"2_CR19","unstructured":"Sun Microsystems, Inc.: Java Card Technology (2004), \n \n http:\/\/java.sun.com\/products\/javacard\/\n \n \n download 2004-06-07"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11733447_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:53:07Z","timestamp":1619491987000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11733447_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333111","9783540333128"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11733447_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}