0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Smart Card Security - Applications, Attacks, and Countermeasures (Paperback): Brij B. Gupta, Megha Quamara Smart Card Security - Applications, Attacks, and Countermeasures (Paperback)
Brij B. Gupta, Megha Quamara
R571 Discovery Miles 5 710 Ships in 12 - 17 working days

Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart card-based systems. The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart card-based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart card-based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks. The book continues with a focus on the security attacks against remote user authentication mechanisms in smart card-based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart card-based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart card-based systems and applications. The final chapter explains the role of blockchain technology for securing smart card-based transactions and quantum cryptography for designing secure smart card-based algorithms. Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications.

Smart Card Security - Applications, Attacks, and Countermeasures (Hardcover): Brij B. Gupta, Megha Quamara Smart Card Security - Applications, Attacks, and Countermeasures (Hardcover)
Brij B. Gupta, Megha Quamara
R1,577 Discovery Miles 15 770 Ships in 12 - 17 working days

Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart card-based systems. The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart card-based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart card-based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks. The book continues with a focus on the security attacks against remote user authentication mechanisms in smart card-based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart card-based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart card-based systems and applications. The final chapter explains the role of blockchain technology for securing smart card-based transactions and quantum cryptography for designing secure smart card-based algorithms. Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Lucky Plastic 3-in-1 Nose Ear Trimmer…
R299 R276 Discovery Miles 2 760
Financial Accounting - An Introduction
Jacqui Kew Paperback R623 Discovery Miles 6 230
The Twisted Series - Love / Games / Hate…
Ana Huang Paperback R1,100 R859 Discovery Miles 8 590
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Vitatech Weight Loss Support (30…
R79 Discovery Miles 790
Fantastic Beasts 3 - The Secrets Of…
Eddie Redmayne, Jude Law, … DVD  (1)
R93 Discovery Miles 930
Vital BabyŽ NURTURE™ Ultra-Comfort…
R30 R23 Discovery Miles 230
Peptine Pro Canine/Feline Hydrolysed…
R369 R259 Discovery Miles 2 590
Snappy Tritan Bottle (1.5L)(Blue)
R229 R179 Discovery Miles 1 790
Gloria
Sam Smith CD R187 R177 Discovery Miles 1 770

 

Partners