Author of the publication

On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation.

, , , , and . SEC, volume 181 of IFIP, page 551-564. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Countermeasures for Attacks on Satellite TV Cards using Open Receivers., , , and . ACSW, volume 44 of CRPIT, page 153-158. Australian Computer Society, (2005)A Mutual Authentication Enabled Fair-Exchange and Anonymous E-Payment Protocol., , and . CEC/EEE, page 20. IEEE Computer Society, (2006)Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck?. SEC, volume 193 of IFIP Conference Proceedings, page 77-92. Kluwer, (2001)Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence., , and . CARDIS, volume 5189 of Lecture Notes in Computer Science, page 118-132. Springer, (2008)An Asymmetric Cryptography Secure Channel Protocol for Smart Cards., and . SEC, volume 147 of IFIP, page 351-366. Kluwer / Springer, (2004)Problems and Prospects of Multi Application Smart cards in the UK Financial Industry., and . ICEBE, page 447-452. IEEE Computer Society, (2007)Design, Installation and Execution of a Security Agent for Mobile Stations., , , and . CARDIS, volume 3928 of Lecture Notes in Computer Science, page 1-15. Springer, (2006)Inhibiting Card Sharing Attacks., , and . IWSEC, volume 4266 of Lecture Notes in Computer Science, page 239-251. Springer, (2006)On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation., , , , and . SEC, volume 181 of IFIP, page 551-564. Springer, (2005)Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards.. ICICS, volume 1726 of Lecture Notes in Computer Science, page 230-243. Springer, (1999)