Publication year: 2008
ISBN: 978-3-540-85893-5
Internet Resource: Please Login to download book
This book deals with the various issues related to the use of small electronic tokens in the process of human-machine interactions. The conference scopes include numerous subfields such as networking, efficient implementations, physical security, biometrics, etc.
Subject: Computer Science / Cryptology / Electronics and Microelectronics, Instrumentation / Management of Computing and Information Systems / Computers and Society / Computer Communication Networks / Systems and Data Security / IFIP / authentication / benchmark / communication security / cryptanalysis / cryptographic protocols / digital signatures / efficient implementation / embedded security / hash based cryptography / information security / network security / security / trust