The smartcard as a mobile security device

被引:10
|
作者
Scheuermann, D [1 ]
机构
[1] Fraunhofer Inst Secure Telecooperat SIT, D-64295 Darmstadt, Germany
来源
关键词
D O I
10.1049/ecej:20020503
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Modern society would like to replace paper by electronic data carriers and mechanical processes by electronic processes. Smartcards offer one means to this end in the form of a personal mobile security device. Personal data can be stored in a mobile personal environment instead of in a central database, and processor smartcards additionally provide a sort of pocket PC that can perform security functions at a higher level of security than an ordinary PC. Interoperability of different smartcards with different smartcard readers and data terminals is very important; therefore, standards exist for the structure of data objects on the card and for coding the commands sent to the card. Biometric user-authentication is becoming increasingly important for smartcards as an alternative to the previously used PIN or password authentication. Additional convenience for the user can be provided by contactless cards.
引用
收藏
页码:205 / 210
页数:6
相关论文
共 50 条
  • [1] Biometrics to enhance smartcard security
    Bella, G
    Bistarelli, S
    Martinelli, F
    SECURITY PROTOCOLS, 2005, 3364 : 324 - 335
  • [2] Security Validation of Smartcard: MCOS
    Yahya, Saadiah
    Omar, Nik Azmi Nik
    PROCEEDINGS OF KNOWLEDGE MANAGEMENT 5TH INTERNATIONAL CONFERENCE 2010, 2010, : 527 - 532
  • [3] Formal methods for smartcard security
    Barthe, G
    Dufay, G
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 133 - 177
  • [4] Mobile device security is a concern
    不详
    COMMUNICATIONS NEWS, 2008, 45 (07): : 6 - 6
  • [5] Mobile Device Security Introduction
    Viega, John
    Michael, Bret
    IEEE SECURITY & PRIVACY, 2010, 8 (02) : 11 - 12
  • [6] A unified framework for mobile device security
    Jansen, W
    Gavrila, S
    Korolev, V
    Heute, T
    Séveillac, C
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 9 - 14
  • [7] Mobile Smartphone as a Security and Surveillance Device
    Musikic, Milan
    Samardzija, Dragan
    2021 29TH TELECOMMUNICATIONS FORUM (TELFOR), 2021,
  • [8] Security for Mobile Device Assets: A Survey
    Lima, Antonio
    Sousa, Bruno
    Cruz, Tiago
    Simoes, Paulo
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017), 2017, : 227 - 236
  • [9] Mobile Device Penetration Testing Framework and Platform for the Mobile Device Security Course
    Jadhav, Suyash
    Oh, Tae
    Kim, Young Ho
    Kim, Joeng Nyeo
    2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 675 - 680
  • [10] Security Analysis of Mobile Device-to-Device Network Applications
    Liu, Kecheng
    Shen, Wenlong
    Cheng, Yu
    Cai, Lin X.
    Li, Qing
    Zhou, Sheng
    Niu, Zhisheng
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 2922 - 2932