Affiliation:
1. National Institute of Technology, Kurukshetra, India
Abstract
Smart cards have gained popularity in many domains by providing different facilities in every domain. Such cards are beneficial for storing credentials and access information. The cards are easy to carry and provides easy and fast computations. The cards have certain limitations due to the possible attacks on them. This chapter gives an overview of the smartcards including its history, physical design, life cycle. It also provides an overview of the possible threats on smartcards and its application area.
Reference40 articles.
1. IoT transaction processing through cooperative concurrency control on fog–cloud computing environment.;A.Al-Qerem;Soft Computing,2019
2. DNS rule-based schema to botnet detection
3. Almomani, A., Gupta, B. B., Wan, T. C., Altaher, A., & Manickam, S. (2013). Phishing dynamic evolving neural fuzzy framework for online detection zero-day phishing email. arXiv preprint arXiv:1302.0629.
4. Adoption of smart cards in the medical sector:
5. Bar-El, H. (2005). Known attacks against smartcards.