Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1668
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMayes, Keith. ;en_US
dc.contributor.authorMarkantonakis, Konstantinos. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:31:03Z-
dc.date.available2020-05-17T08:31:03Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319505008 ;en_US
dc.identifier.isbn9783319504988 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1668-
dc.description005.74 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionPrinted edition: ; 9783319504988. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers. . ;en_US
dc.description.statementofresponsibilityedited by Keith Mayes, Konstantinos Markantonakis.en_US
dc.description.tableofcontentsAn Introduction to Smart Cards -- Smart Card Production Environment -- Multi Application Smart Card Platforms and Operating Systems -- Smart Cards and Security for Mobile Communications -- Smart Cards for Banking and Finance -- Security for Video Broadcasting -- Introduction to the TPM -- Common Criteria -- Smart Card Security -- Application Development Environments for Java and SIM Toolkit -- OTA and Secure SIM Lifecycle Management -- Smart Card Reader and Mobile APIs -- RFID and Contactless Technology -- ID Cards and Passports -- Smart Card Technology Trends -- Securing the Internet of Things -- MULTOS and MULTOS Application Development -- Trusted Execution Environment and Host Card Emulation. ;en_US
dc.format.extentXXXV, 531 p. 180 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319505008.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectComputer Securityen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectSystems and Data Securityen_US
dc.subjectSecurity. ;en_US
dc.subjectComputer Communicaten_US
dc.titleSmart Cards, Tokens, Security and Applicationsen_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.date.edition2nd ed. 2017. ;en_US
dc.classification.lcQA76.9.D35 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319505008.pdf16.77 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMayes, Keith. ;en_US
dc.contributor.authorMarkantonakis, Konstantinos. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:31:03Z-
dc.date.available2020-05-17T08:31:03Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319505008 ;en_US
dc.identifier.isbn9783319504988 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1668-
dc.description005.74 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionPrinted edition: ; 9783319504988. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers. . ;en_US
dc.description.statementofresponsibilityedited by Keith Mayes, Konstantinos Markantonakis.en_US
dc.description.tableofcontentsAn Introduction to Smart Cards -- Smart Card Production Environment -- Multi Application Smart Card Platforms and Operating Systems -- Smart Cards and Security for Mobile Communications -- Smart Cards for Banking and Finance -- Security for Video Broadcasting -- Introduction to the TPM -- Common Criteria -- Smart Card Security -- Application Development Environments for Java and SIM Toolkit -- OTA and Secure SIM Lifecycle Management -- Smart Card Reader and Mobile APIs -- RFID and Contactless Technology -- ID Cards and Passports -- Smart Card Technology Trends -- Securing the Internet of Things -- MULTOS and MULTOS Application Development -- Trusted Execution Environment and Host Card Emulation. ;en_US
dc.format.extentXXXV, 531 p. 180 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319505008.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectComputer Securityen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectSystems and Data Securityen_US
dc.subjectSecurity. ;en_US
dc.subjectComputer Communicaten_US
dc.titleSmart Cards, Tokens, Security and Applicationsen_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.date.edition2nd ed. 2017. ;en_US
dc.classification.lcQA76.9.D35 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319505008.pdf16.77 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMayes, Keith. ;en_US
dc.contributor.authorMarkantonakis, Konstantinos. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:31:03Z-
dc.date.available2020-05-17T08:31:03Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319505008 ;en_US
dc.identifier.isbn9783319504988 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1668-
dc.description005.74 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionPrinted edition: ; 9783319504988. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers. . ;en_US
dc.description.statementofresponsibilityedited by Keith Mayes, Konstantinos Markantonakis.en_US
dc.description.tableofcontentsAn Introduction to Smart Cards -- Smart Card Production Environment -- Multi Application Smart Card Platforms and Operating Systems -- Smart Cards and Security for Mobile Communications -- Smart Cards for Banking and Finance -- Security for Video Broadcasting -- Introduction to the TPM -- Common Criteria -- Smart Card Security -- Application Development Environments for Java and SIM Toolkit -- OTA and Secure SIM Lifecycle Management -- Smart Card Reader and Mobile APIs -- RFID and Contactless Technology -- ID Cards and Passports -- Smart Card Technology Trends -- Securing the Internet of Things -- MULTOS and MULTOS Application Development -- Trusted Execution Environment and Host Card Emulation. ;en_US
dc.format.extentXXXV, 531 p. 180 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319505008.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectComputer Securityen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectSystems and Data Securityen_US
dc.subjectSecurity. ;en_US
dc.subjectComputer Communicaten_US
dc.titleSmart Cards, Tokens, Security and Applicationsen_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.date.edition2nd ed. 2017. ;en_US
dc.classification.lcQA76.9.D35 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319505008.pdf16.77 MBAdobe PDFThumbnail
Preview File