{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:16:14Z","timestamp":1743146174086,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076195"},{"type":"electronic","value":"9783319076201"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_20","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:55:03Z","timestamp":1402404903000},"page":"221-232","source":"Crossref","is-referenced-by-count":3,"title":["Rethinking the Smart Card Technology"],"prefix":"10.1007","author":[{"given":"Raja Naeem","family":"Akram","sequence":"first","affiliation":[]},{"given":"Konstantinos","family":"Markantonakis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"20_CR1","first-page":"11","volume":"2","author":"P. Dusart","year":"2008","unstructured":"Dusart, P., Sauveron, D., Tai-Hoon, K.: Some Limits of Common Criteria Certification. International Journal of Security and its Applications\u00a02(4), 11\u201320 (2008)","journal-title":"International Journal of Security and its Applications"},{"key":"20_CR2","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1109\/FGCN.2007.235","volume":"2","author":"D. Sauveron","year":"2007","unstructured":"Sauveron, D., Dusart, P.: Which Trust Can Be Expected of the Common Criteria Certification at End-User Level? Future Generation Communication and Networking\u00a02, 423\u2013428 (2007)","journal-title":"Future Generation Communication and Networking"},{"issue":"7","key":"20_CR3","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1016\/j.comcom.2003.12.004","volume":"27","author":"C. Xenakis","year":"2004","unstructured":"Xenakis, C., Merakos, L.: Security in Third Generation Mobile Networks. Computer Communications\u00a027(7), 638\u2013650 (2004)","journal-title":"Computer Communications"},{"issue":"6","key":"20_CR4","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1361-3723(07)70075-1","volume":"2007","author":"E.E. Schultz","year":"2007","unstructured":"Schultz, E.E.: Research on Usability in Information Security. Computer Fraud & Security\u00a02007(6), 8\u201310 (2007)","journal-title":"Computer Fraud & Security"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-74143-5_5","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"R. Anderson","year":"2007","unstructured":"Anderson, R., Moore, T.: Information Security Economics \u2013 and Beyond. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, pp. 68\u201391. Springer, Heidelberg (2007)"},{"key":"20_CR6","series-title":"CNIS 2007","first-page":"40","volume-title":"Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security","author":"I.G. Askoxylakis","year":"2007","unstructured":"Askoxylakis, I.G., Pramateftakis, M., Kastanis, D.D., Traganitis, A.P.: Integration of a Secure Mobile Payment System in a GSM\/UMTS SIM Smart Card. In: Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security. CNIS 2007, pp. 40\u201350. ACTA Press, Anaheim (2007)"},{"key":"20_CR7","series-title":"SSYM 1999","first-page":"14","volume-title":"Proceedings of the 8th Conference on USENIX Security Symposium","author":"A. Whitten","year":"1999","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny Can\u2019T Encrypt: A Usability Evaluation of PGP 5.0. In: Proceedings of the 8th Conference on USENIX Security Symposium. SSYM 1999, vol.\u00a08, p. 14. USENIX Association, CA (1999)"},{"key":"20_CR8","unstructured":"EMV 4.2, Online, EMVCo Specification 4.2 (May 2008), \n                    \n                      http:\/\/www.emvco.com\/specifications.aspx?id=155"},{"key":"20_CR9","unstructured":"Entity Authentication Assurance Framework, ITU-T, Geneva, Switzerland, Recommendation ITU-T X.1254 (September 2012), \n                    \n                      http:\/\/www.itu.int\/rec\/T-REC-X.1254-201209-I"},{"issue":"3","key":"20_CR10","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s00779-011-0444-7","volume":"16","author":"A. Mitrokotsa","year":"2012","unstructured":"Mitrokotsa, A., Sheng, Q.Z., Maamar, Z.: User-driven RFID applications and challenges. Personal and Ubiquitous Computing\u00a016(3), 223\u2013224 (2012)","journal-title":"Personal and Ubiquitous Computing"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-642-10838-9_3","volume-title":"Information Security Applications","author":"R.N. Akram","year":"2009","unstructured":"Akram, R.N., Markantonakis, K., Mayes, K.: Application Management Framework in User Centric Smart Card Ownership Model. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol.\u00a05932, pp. 20\u201335. Springer, Heidelberg (2009)"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Petroulakis, N.E., Askoxylakis, I.G., Tryfonas, T.: Life-logging in Smart Environments: Challenges and Security Threats. In: 2012 IEEE International Conference on Communications (ICC), pp. 5680\u20135684. IEEE (2012)","DOI":"10.1109\/ICC.2012.6364934"},{"key":"20_CR13","series-title":"ICMB-GMR 2010","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/ICMB-GMR.2010.63","volume-title":"Proceedings of the 2010 Ninth International Conference on Mobile Business \/ 2010 Ninth Global Mobility Roundtable","author":"J. Laugesen","year":"2010","unstructured":"Laugesen, J., Yuan, Y.: What Factors Contributed to the Success of Apple\u2019s iPhone? In: Proceedings of the 2010 Ninth International Conference on Mobile Business \/ 2010 Ninth Global Mobility Roundtable. ICMB-GMR 2010, pp. 91\u201399. IEEE Computer Society, Washington, DC (2010)"},{"key":"20_CR14","unstructured":"Near Field Communications (NFC). Simplifying and Expanding. Contactless Commerce, Connectivity, and Content, ABI Research, Oyster Bay, NY (2006), \n                    \n                      http:\/\/www.abiresearch.com\/research\/1000885-Near-Field_Communications_NFC"},{"issue":"2","key":"20_CR15","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.istr.2009.06.007","volume":"14","author":"D. Sauveron","year":"2009","unstructured":"Sauveron, D.: Multiapplication Smart Card: Towards an Open Smart Card? Inf. Secur. Tech. Rep.\u00a014(2), 70\u201378 (2009)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"20_CR16","unstructured":"The GlobalPlatform Proposition for NFC Mobile: Secure Element Management and Messaging, GlobalPlatform, White Paper (April 2009)"},{"key":"20_CR17","unstructured":"Mobile NFC Services, GSM Association, White Paper Version 1.0 (2007), \n                    \n                      http:\/\/www.gsmworld.com\/documents\/nfc_services_0207.pdf"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Akram, R.N., Markantonakis, K., Mayes, K.: A Paradigm Shift in Smart Card Ownership Model. In: Apduhan, B.O., Gervasi, O., Iglesias, A., Taniar, D., Gavrilova, M. (eds.) Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010), pp. 191\u2013200. IEEE Computer Society, Fukuoka (2010)","DOI":"10.1109\/ICCSA.2010.52"},{"key":"20_CR19","unstructured":"GlobalPlatform, A.: New Model: The Consumer-Centric Model and How It Applies to the Mobile Ecosystem, GlobalPlatform, Whitepaper (March 2013)"},{"key":"20_CR20","first-page":"3","volume-title":"Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology","author":"P. Girard","year":"1999","unstructured":"Girard, P.: Which Security Policy for Multiplication Smart Cards? In: Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology, p. 3. USENIX Association, Berkeley (1999), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm?id=1267115.1267118"},{"key":"20_CR21","unstructured":"Chaumette, S., Sauveron, D.: New Security Problems Raised by Open Multiapplication Smart Cards. LaBRI, Universit\u00e9 Bordeaux 1, pp. 1332\u201304 (2004)"},{"key":"20_CR22","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-15257-3_15","volume-title":"Security and Privacy \u2013 Silver Linings in the Cloud","author":"R.N. Akram","year":"2010","unstructured":"Akram, R.N., Markantonakis, K., Mayes, K.: A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) SEC 2010. IFIP AICT, vol.\u00a0330, pp. 161\u2013172. Springer, Heidelberg (2010)"},{"key":"20_CR23","unstructured":"London Underground: Oyster Card. London Underground. United Kingdom, \n                    \n                      https:\/\/oyster.tfl.gov.uk\/oyster\/entry.do\n                    \n                    \n                   (visited June 2010)"},{"key":"20_CR24","unstructured":"EnglishOctopus. Octopus Holdings Ltd. Hong Kong, China, \n                    \n                      http:\/\/www.octopus.com.hk\/home\/en\/index.html\n                    \n                    \n                   (visited December 2010)"},{"key":"20_CR25","unstructured":"Akram, R.N., Markantonakis, K., Mayes, K.: Remote Attestation Mechanism based on Physical Unclonable Functions. In: Zhou, C.M.J., Weng, J. (eds.) The 2013 Workshop on RFID and IoT Security (RFIDsec 2013 Asia). IOS Press, Guangzhou (November 2013)"},{"key":"20_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-319-02726-5_12","volume-title":"Information and Communications Security","author":"R.N. Akram","year":"2013","unstructured":"Akram, R.N., Markantonakis, K., Mayes, K.: Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators. In: Qing, S., Zhou, J., Liu, D. (eds.) ICICS 2013. LNCS, vol.\u00a08233, pp. 151\u2013166. Springer, Heidelberg (2013)"},{"key":"20_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-642-04391-8_23","volume-title":"Biometric ID Management and Multimodal Communication","author":"J. Bringer","year":"2009","unstructured":"Bringer, J., Chabanne, H., Kevenaar, T.A.M., Kindarji, B.: Extending Match-On-Card to Local Biometric Identification. In: Fierrez, J., Ortega-Garcia, J., Esposito, A., Drygajlo, A., Faundez-Zanuy, M. (eds.) BioID MultiComm2009. LNCS, vol.\u00a05707, pp. 178\u2013186. Springer, Heidelberg (2009), \n                    \n                      http:\/\/www.springerlink.com\/content\/b16016708315549v\/fulltext.pdf"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"Akram, R.N., Markantonakis, K., Mayes, K.: A Privacy Preserving Application Acquisition Protocol. In: Geyong Min, F.G.M. (ed.) 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2012). IEEE Computer Society, Liverpool (June 2012)","DOI":"10.1109\/TrustCom.2012.47"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Akram, R.N., Markantonakis, K., Mayes, K.: A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2013). IEEE Computer Society, Melbourne (2013)","DOI":"10.1109\/TrustCom.2013.245"},{"key":"20_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-34129-8_19","volume-title":"Information and Communications Security","author":"R.N. Akram","year":"2012","unstructured":"Akram, R.N., Markantonakis, K., Mayes, K.: Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol.\u00a07618, pp. 214\u2013227. Springer, Heidelberg (2012)"},{"key":"20_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/3-540-48683-6_43","volume-title":"Computer Aided Verification","author":"D. Basin","year":"1999","unstructured":"Basin, D., Friedrich, S., Posegga, J., Vogt, H.: Java Bytecode Verification by Model Checking. In: Halbwachs, N., Peled, D.A. (eds.) CAV 1999. LNCS, vol.\u00a01633, pp. 491\u2013494. Springer, Heidelberg (1999)"},{"key":"20_CR32","unstructured":"Java Card Platform Specification: Classic Edition; Application Programming Interface, Runtime Environment Specification, Virtual Machine Specification, Connected Edition; Runtime Environment Specification, Java Servlet Specification, Application Programming Interface, Virtual Machine Specification, Sample Structure of Application Modules, Sun Microsystem Inc Std. Version 3.0.1 (May 2009)"},{"key":"20_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-45685-6_5","volume-title":"Theorem Proving in Higher Order Logics","author":"D. Basin","year":"2002","unstructured":"Basin, D., Friedrich, S., Gawkowski, M.: Verified Bytecode Model Checkers. In: Carre\u00f1o, V.A., Mu\u00f1oz, C.A., Tahar, S. (eds.) TPHOLs 2002. LNCS, vol.\u00a02410, pp. 47\u201366. Springer, Heidelberg (2002)"},{"key":"20_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-642-12510-2_9","volume-title":"Smart Card Research and Advanced Application","author":"R.N. Akram","year":"2010","unstructured":"Akram, R.N., Markantonakis, K., Mayes, K.: Firewall Mechanism in a User Centric Smart Card Ownership Model. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 118\u2013132. Springer, Heidelberg (2010)"},{"key":"20_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-22497-3_14","volume-title":"Information Security and Privacy","author":"R.N. Akram","year":"2011","unstructured":"Akram, R.N., Markantonakis, K., Mayes, K.: Application-Binding Protocol in the User Centric Smart Card Ownership Model. In: Parampalli, U., Hawkes, P. (eds.) ACISP 2011. LNCS, vol.\u00a06812, pp. 208\u2013225. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:12:44Z","timestamp":1582413164000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}