000 02718nam a22002535a 4500
999 _c32092
_d32092
001 OCM1ssj0001819313
020 _a9783319504988
020 _a9783319505008
082 0 4 _a005.74 SM AR
245 0 0 _aSmart cards, tokens, security and applications
_cEdited by Keith Mayes, Konstantinos Markantonakis
250 _a2nd ed.
260 _aCham :
_bSpringer International Publishing :
_cc2017.
300 _axxxv, 531 p. :
_bill. ;
_c25 cm.
505 0 _aAn Introduction to Smart Cards -- Smart Card Production Environment -- Multi Application Smart Card Platforms and Operating Systems -- Smart Cards and Security for Mobile Communications -- Smart Cards for Banking and Finance -- Security for Video Broadcasting -- Introduction to the TPM -- Common Criteria -- Smart Card Security -- Application Development Environments for Java and SIM Toolkit -- OTA and Secure SIM Lifecycle Management -- Smart Card Reader and Mobile APIs -- RFID and Contactless Technology -- ID Cards and Passports -- Smart Card Technology Trends -- Securing the Internet of Things -- MULTOS and MULTOS Application Development -- Trusted Execution Environment and Host Card Emulation.
520 _aThis book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.
650 0 _aComputer science
_9898
650 0 _aComputer communication systems
_98371
650 0 _aComputer security
_9641
650 0 _aData structures (Computer science)
_9749
700 1 _aMayes, Keith,
_eEdited by
_938420
700 1 _aMarkantonakis, Konstantinos,
_eEdited by
_938421
856 _uhttps://uowd.box.com/s/emji2tyypl5bnk41qhxxpqodaug1myvj
_zLocation Map
942 _2ddc
_cREGULAR