Skip to main content

The practical application of state of the art security in real environments

  • Section 9 Applications
  • Conference paper
  • First Online:
Advances in Cryptology — AUSCRYPT '90 (AUSCRYPT 1990)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 453))

Included in the following conference series:

  • 224 Accesses

Abstract

If large distributed networks will exist in the future, as market trends predict, and if their security becomes an issue, then the types of solutions proposed in this paper will be of undoubted interest.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

10. Bibliography

  1. "System Requirements and Design Specifications of the SAPPHIRE Security Server", Philips TDS, Advanced Development Project on Security, 1989.

    Google Scholar 

  2. ISO/IS 7816-1: "Identification cards, Integrated circuit(s) with contacts" (Part 1: Physical characteristics).

    Google Scholar 

  3. ISO/IS 7816-2: "Identification cards, Integrated circuit(s) with contacts" (Part 2: Dimensions and location of the contacts).

    Google Scholar 

  4. ISO/IEC/DIS 7816-3: "Identification cards, Integrated circuit(s) with contacts" (Part 3: Electronic signals and protocols).

    Google Scholar 

  5. R. Ferreira: "On the utilisation of Smart Card Technology in High Security applications", IFIP conference SECURICOM, Monte Carlo, 1986.

    Google Scholar 

  6. R.M. Needham, M. Schroeder: "Using Encryption for Authentication in Large Networks of Computers", Comm. ACM, Vol. 21, No 12, December 1978, pp 993–999.

    Google Scholar 

  7. R. Ferreira, J.J. Quisquater: "Towards more practical Key Management Solutions in Computer Networks using the Smart Card", Proceedings of Smart Card 2000, Vienna, October 1987.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jennifer Seberry Josef Pieprzyk

Rights and permissions

Reprints and permissions

Copyright information

© 1990 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ferreira, R. (1990). The practical application of state of the art security in real environments. In: Seberry, J., Pieprzyk, J. (eds) Advances in Cryptology — AUSCRYPT '90. AUSCRYPT 1990. Lecture Notes in Computer Science, vol 453. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030374

Download citation

  • DOI: https://doi.org/10.1007/BFb0030374

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-53000-8

  • Online ISBN: 978-3-540-46297-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics