메뉴 건너뛰기




Volumn 9781461479154, Issue , 2014, Pages 407-427

Security evaluation and common criteria

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION CONTEXTS; COMMON CRITERIA; CURRENT DIRECTION; EMBEDDED DEVICE; EMBEDDED-DEVICE SECURITIES; EVALUATION CRITERIA; EVALUATION SCHEME; SECURITY EVALUATION; SOFTWARE APPLICATIONS;

EID: 84949177853     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-4614-7915-4_18     Document Type: Chapter
Times cited : (3)

References (27)
  • 11
    • 85192423236 scopus 로고    scopus 로고
    • Government Computer News Engineer shows how to crack a secure
    • accessed 2 June 2011
    • Government Computer News, Engineer shows how to crack a "secure" TPM chip, [Online] http://gcn.com/articles/2010/02/02/black-hat-chip-crack-020210.aspx, (accessed 2 June 2011)
    • TPM Chip
  • 12
    • 68549110346 scopus 로고    scopus 로고
    • Smart card security evaluation: Community solutions to intractable problems
    • May
    • Boswell T, Smart card security evaluation: Community solutions to intractable problems, Information Security Technical Report, Volume 14 issue 2, May 2009, pp57-69.
    • (2009) Information Security Technical Report , vol.14 , Issue.2 , pp. 57-69
    • Boswell, T.1
  • 13
    • 1242295745 scopus 로고    scopus 로고
    • 25 May
    • NIST, Security Requirements For Cryptographic Modules, FIPS PUB 140-2, issued 25 May 2001, with change notices as at 12 March 2002 (The original FIPS 140 standard was FIPS 140-1; this was superseded by FIPS140-2, and FIPS 140-3 is in draft at the time of writing. In this chapter, FIPS 140 is used as a general name for the scheme.).
    • (2001) NIST Security Requirements for Cryptographic Modules FIPS PUB 140-2, Issued


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.