{"title":"Information Security Best Practices","authors":"K. Mayes, K. Markantonakis","doi":"10.1007/978-1-4614-7915-4_6","DOIUrl":"https://doi.org/10.1007/978-1-4614-7915-4_6","url":null,"abstract":"","PeriodicalId":113386,"journal":{"name":"Secure Smart Embedded Devices, Platforms and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116331805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Potential Vulnerabilities in Payment Terminals","authors":"K. Rantos, K. Markantonakis","doi":"10.1007/978-1-4614-7915-4_13","DOIUrl":"https://doi.org/10.1007/978-1-4614-7915-4_13","url":null,"abstract":"","PeriodicalId":113386,"journal":{"name":"Secure Smart Embedded Devices, Platforms and Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114840720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Introduction to Smart Cards and RFIDs","authors":"K. Mayes, K. Markantonakis","doi":"10.1007/978-1-4614-7915-4_1","DOIUrl":"https://doi.org/10.1007/978-1-4614-7915-4_1","url":null,"abstract":"","PeriodicalId":113386,"journal":{"name":"Secure Smart Embedded Devices, Platforms and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116644299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Introduction to Java Card Programming","authors":"Raja Naeem Akram, K. Markantonakis, K. Mayes","doi":"10.1007/978-1-4614-7915-4_22","DOIUrl":"https://doi.org/10.1007/978-1-4614-7915-4_22","url":null,"abstract":"","PeriodicalId":113386,"journal":{"name":"Secure Smart Embedded Devices, Platforms and Applications","volume":"637 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115114155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Evaluation and Common Criteria","authors":"Tony Boswell","doi":"10.1007/978-1-4614-7915-4_18","DOIUrl":"https://doi.org/10.1007/978-1-4614-7915-4_18","url":null,"abstract":"","PeriodicalId":113386,"journal":{"name":"Secure Smart Embedded Devices, Platforms and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124293019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The BIOS and Rootkits","authors":"Graham Hili, K. Mayes, K. Markantonakis","doi":"10.1007/978-1-4614-7915-4_16","DOIUrl":"https://doi.org/10.1007/978-1-4614-7915-4_16","url":null,"abstract":"","PeriodicalId":113386,"journal":{"name":"Secure Smart Embedded Devices, Platforms and Applications","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114706595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}