{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:17:34Z","timestamp":1725887854367},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319504988"},{"type":"electronic","value":"9783319505008"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50500-8_15","type":"book-chapter","created":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T11:14:46Z","timestamp":1495106086000},"page":"413-443","source":"Crossref","is-referenced-by-count":0,"title":["Smart Card Technology Trends"],"prefix":"10.1007","author":[{"given":"Chris","family":"Shire","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,19]]},"reference":[{"unstructured":"A set of specifications are publicly available \nhttp:\/\/csrc.nist.gov\/piv-project\n\n, Cited 5 May 2016.","key":"15_CR1"},{"unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik, \u201cSecurity IC Platform Protection Profile with Augmentation Packages\u201d Certificate BSI-PP-0084-2014.","key":"15_CR2"},{"unstructured":"CAC info \nhttp:\/\/www.cac.mil\/\n\n CAC Case study whitepaper by Smart Card Alliance 2001: \nhttp:\/\/www.smartcardalliance.org\/resources\/lib\/DoD_CAC_Profile.pdf\n\n Cited 21.9.2015, US official information \nhttps:\/\/www.cac.mil\/Home.do","key":"15_CR3"},{"unstructured":"Copies of the EMV specifications \nhttps:\/\/www.emvco.com\/specifications.aspx\n\n, Cited 05 May 2015.","key":"15_CR4"},{"unstructured":"Council Regulation (EC) No 2252\/2004 of 13 December 2004, \nhttp:\/\/ec.europa.eu\/dgs\/home-affairs\/what-we-do\/policies\/borders-and-visas\/visa-policy\/index_en.htm\n\n, Cited 5 May 2016.","key":"15_CR5"},{"unstructured":"European Union Directive establishing the framework for electronic signatures: \u201c Directive 1999\/93\/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures. and \u201dCommission Decision 2003\/511\/EC adopting three CEN Workshop Agreements as technical standards presumed to be in accordance with the Directive","key":"15_CR6"},{"unstructured":"UK card statistics, \nhttp:\/\/www.theukcardsassociation.org.uk\/wm_documents\/UK%20Card%20Payments%202015%20Summary.pdf","key":"15_CR7"},{"unstructured":"Root of trust white paper June 2012 SANS Institute, \nhttp:\/\/www.trustedcomputinggroup.org\/resources\/implementing_hardware_roots_of_trust\n\n, Cited 5 May 2016.","key":"15_CR8"},{"unstructured":"EU Tachograph website with specifications [5], Cited 5 May 2015.","key":"15_CR9"},{"unstructured":"Further information on NFC can be found on the NFC Forum website via \nwww.nfc-forum.org\n\n, Cited 5 May 2016.","key":"15_CR10"},{"unstructured":"ISO\/IEC 24727-1:2007 PDF version (en) can be found on the ISO website \nwww.iso.org\n\n, Cited 5 May 2016.","key":"15_CR11"},{"unstructured":"Mobile Operators Association figures: \nhttp:\/\/www.mobilemastinfo.com\/stats-and-facts\/\n\n, Cited 18 Sep 2015.","key":"15_CR12"},{"key":"15_CR13","volume-title":"that the number of transistors on an integrated circuit for minimum component cost doubles every 18 months","author":"Moore\u2019s Law is the empirical observation made in","year":"1965","unstructured":"Moore\u2019s Law is the empirical observation made in 1965 that the number of transistors on an integrated circuit for minimum component cost doubles every 18 months. It is attributed to Gordon E. Moore a co-founder of Intel."},{"unstructured":"Standardisation process information via \nhttp:\/\/www.etsi.org\/\n\n, Cited 18 Sep 2015.","key":"15_CR14"},{"unstructured":"The Common Criteria Organisation, \u201cCommon Criteria for Information Technology Security Evaluation V3.1\u201d, 2012. Source: \nhttp:\/\/www.commoncriteriaportal.org\/cc\/\n\n, Cited 5 May 2016.","key":"15_CR15"},{"unstructured":"National Institute of Standards and Technology \nhttp:\/\/csrc.ncsl.nist.gov\/\n\n has published FIPS 140-1 \nhttp:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/standards.html\n\n \u201cSecurity Requirements for Cryptographic Modules\u201d concerns physical security of smart card ICs, Cited 5 May 2016.","key":"15_CR16"},{"unstructured":"ICAO 9303 passport specifications, \nhttp:\/\/www.icao.int\/Security\/mrtd\/Pages\/Document9303.aspx\n\n, Cited 5 May 2016.","key":"15_CR17"},{"unstructured":"The JavaCard specification can be licensed from Oracle Inc, \nhttp:\/\/www.oracle.com\/technetwork\/java\/embedded\/javacard\/downloads\/default-1970005.html\n\n and its implementation is managed by Global Platform \nhttp:\/\/globalplatform.org\/\n\n, cited 21 Sept 2015.","key":"15_CR18"},{"unstructured":"The specification in ten parts is available for download from \nhttp:\/\/www.itso.org.uk\/the-specification\/\n\n, Cited 5 May 2016.","key":"15_CR19"},{"unstructured":"The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 \u201cUSA PATRIOT Act\u201d, \nhttp:\/\/thomas.loc.gov\/cgi-bin\/bdquery\/z?d107:HR03162:%7CTOM:\/bss\/d107query.html%7C\n\n, Cited 5 May 2016.","key":"15_CR20"},{"unstructured":"FFA UK Annual Review 2015 \nhttp:\/\/www.financialfraudaction.org\n\n, Sept 2015, Cited 5 May 2016.","key":"15_CR21"},{"unstructured":"GMSA subscriber growth, \nhttp:\/\/www.gsma.com\/newsroom\/press-release\/one-billion-new-unique-mobile-subscribers-by-2020-gsma\/\n\n, Cited 18 Sep 2015","key":"15_CR22"},{"unstructured":"EN 15320 Identification Card Systems - Surface Transport Applications - Interoperable Public Transport Application (IOPTA), \nhttp:\/\/www.cenorm.be\/CENORM\/BusinessDomains\/\n\n Cited 2 Apr 2006.","key":"15_CR23"},{"unstructured":"Secure Flash memory, \nhttps:\/\/silicontrust.wordpress.com\/2011\/04\/06\/secure-flash-for-high-security-smart-cards\/\n\n, Cited 5 May 2016.","key":"15_CR24"},{"unstructured":"Smart card statistics, \nhttp:\/\/www.eurosmart.com\/publications\n\n, Cited 5 May 2016.","key":"15_CR25"},{"unstructured":"Megamos crypto attack, \nhttp:\/\/www.computerworld.com\/article\/2971826\/cybercrime-hacking\/hack-to-steal-cars-with-keyless-ignition-volkswagen-spent-2-years-hiding-flaw.html\n\n, Cited 5 May 2016.","key":"15_CR26"},{"unstructured":"Smart card statistics derived from Eurosmart data, \nhttp:\/\/www.eurosmart.com\n\n, Cited 5 May 2016.","key":"15_CR27"}],"container-title":["Smart Cards, Tokens, Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50500-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T11:22:50Z","timestamp":1495106570000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50500-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319504988","9783319505008"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50500-8_15","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}