Publication | Closed Access
Breaking up is hard to do: modeling security threats for smart cards
74
Citations
11
References
1999
Year
Unknown Venue
Smart card systems differ from conventional computer systems in that different aspects of the system are not under a single trust boundary. The processor, I/O, data, programs, and network may be controlled by different, and hostile, parties. We discuss the security ramifications of these “splits ” in trust, showing that they are fundamental to a proper understanding of the security of systems that include smart cards. 1
| Year | Citations | |
|---|---|---|
Page 1
Page 1