|
Showing 1 - 3 of
3 matches in All Departments
Smart Card Security: Applications, Attacks, and Countermeasures
provides an overview of smart card technology and explores
different security attacks and countermeasures associated with it.
It covers the origin of smart cards, types of smart cards, and how
they work. It discusses security attacks associated with hardware,
software, data, and users that are a part of smart card-based
systems. The book starts with an introduction to the concept of
smart cards and continues with a discussion of the different types
of smart cards in use today, including various aspects regarding
their configuration, underlying operating system, and usage. It
then discusses different hardware- and software-level security
attacks in smart card-based systems and applications and the
appropriate countermeasures for these security attacks. It then
investigates the security attacks on confidentiality, integrity,
and availability of data in smart card-based systems and
applications, including unauthorized remote monitoring,
communication protocol exploitation, denial of service (DoS)
attacks, and so forth, and presents the possible countermeasures
for these attacks. The book continues with a focus on the security
attacks against remote user authentication mechanisms in smart
card-based applications and proposes a possible countermeasure for
these attacks. Then it covers different communication standards for
smart card-based applications and discusses the role of smart cards
in various application areas as well as various open-source tools
for the development and maintenance of smart card-based systems and
applications. The final chapter explains the role of blockchain
technology for securing smart card-based transactions and quantum
cryptography for designing secure smart card-based algorithms.
Smart Card Security: Applications, Attacks, and Countermeasures
provides you with a broad overview of smart card technology and its
various applications.
The Internet of Things (IoT), with its technological advancements
and massive innovations, is building the idea of inter-connectivity
among everyday life objects. With an explosive growth in the number
of Internet-connected devices, the implications of the idea of IoT
on enterprises, individuals, and society are huge. IoT is getting
attention from both academia and industry due to its powerful
real-time applications that raise demands to understand the entire
spectrum of the field. However, due to increasing security issues,
safeguarding the IoT ecosystem has become an important concern.
With devices and information becoming more exposed and leading to
increased attack possibilities, adequate security measures are
required to leverage the benefits of this emerging concept.
Internet of Things Security: Principles, Applications, Attacks, and
Countermeasures is an extensive source that aims at establishing an
understanding of the core concepts of IoT among its readers and the
challenges and corresponding countermeasures in the field. Key
features: Containment of theoretical aspects, as well as recent
empirical findings associated with the underlying technologies
Exploration of various challenges and trade-offs associated with
the field and approaches to ensure security, privacy, safety, and
trust across its key elements Vision of exciting areas for future
research in the field to enhance the overall productivity This book
is suitable for industrial professionals and practitioners,
researchers, faculty members, and students across universities who
aim to carry out research and development in the field of IoT
security.
Smart Card Security: Applications, Attacks, and Countermeasures
provides an overview of smart card technology and explores
different security attacks and countermeasures associated with it.
It covers the origin of smart cards, types of smart cards, and how
they work. It discusses security attacks associated with hardware,
software, data, and users that are a part of smart card-based
systems. The book starts with an introduction to the concept of
smart cards and continues with a discussion of the different types
of smart cards in use today, including various aspects regarding
their configuration, underlying operating system, and usage. It
then discusses different hardware- and software-level security
attacks in smart card-based systems and applications and the
appropriate countermeasures for these security attacks. It then
investigates the security attacks on confidentiality, integrity,
and availability of data in smart card-based systems and
applications, including unauthorized remote monitoring,
communication protocol exploitation, denial of service (DoS)
attacks, and so forth, and presents the possible countermeasures
for these attacks. The book continues with a focus on the security
attacks against remote user authentication mechanisms in smart
card-based applications and proposes a possible countermeasure for
these attacks. Then it covers different communication standards for
smart card-based applications and discusses the role of smart cards
in various application areas as well as various open-source tools
for the development and maintenance of smart card-based systems and
applications. The final chapter explains the role of blockchain
technology for securing smart card-based transactions and quantum
cryptography for designing secure smart card-based algorithms.
Smart Card Security: Applications, Attacks, and Countermeasures
provides you with a broad overview of smart card technology and its
various applications.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|