Author of the publication

Combining Smart Card Services with a Secure Memory Token.

, , and . Security and Management, page 658-664. CSREA Press, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing Access to Security Hardware in PC Browsers., , and . WASH, volume 1011 of CEUR Workshop Proceedings, page 3-9. CEUR-WS.org, (2013)A Proxy Agent for Small Network-Enabled Devices., , and . IPCCC, page 445-449. IEEE Computer Society, (2008)Network Smart Card: A New Paradigm of Secure Online Transactions., , and . SEC, volume 181 of IFIP, page 267-280. Springer, (2005)Secure Authentication Through Insecure Systems: An Innovative Approach to Smart Card Login., and . International Conference on Internet Computing, page 48-54. CSREA Press, (2009)Geometric modeling with a multiresolution representation., , and . CCCG, (1999)Combining Smart Card Services with a Secure Memory Token., , and . Security and Management, page 658-664. CSREA Press, (2010)Secure Network Card - Implementation of a Standard Network Stack in a Smart Card., , and . CARDIS, volume 153 of IFIP, page 193-208. Kluwer/Springer, (2004)Securing the Internet Through Plug-n-Play Smart Cards., and . International Conference on Internet Computing, page 67-74. CSREA Press, (2007)Network smart card review and analysis.. Comput. Networks, 51 (9): 2234-2248 (2007)Adaptive Visualization for Interactive Geometric Modeling in Geoscience., and . WSCG, (2000)