Authentication Method for Electronic Contracts with IC Card Key Managemant

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication and Key Agreement Method for Home Networks Using a Smart Card

Authentication is the most important issue to control the home networks remotely. In this paper, a strong authentication and key agreement method for a smart home network system is presented. The proposed scheme uses a smart card which stores private information and performs cryptic operations. It also uses a modified 3GPP security system that is suitable for the home network. Our scheme provid...

متن کامل

Dynamic Encryption Key based Smart Card Authentication Scheme

In order to keep away from difficulties associated with traditional password based authentication methods, smart card based authentication schemes have been widely used. It has already been accepted worldwide due to its low computational cost. However, most of these schemes are vulnerable to one or the other possible attack. This paper describes a new smart card authentication scheme using symm...

متن کامل

Minimum data set for electronic health card of schizophrenia

Purpose: Having a clinical information system is a good solution for monitoring medical problems. This system is designed to improve the speed and accuracy of data management. The goal is to replace medical records with a clinical information system to support storing, processing and distributing data in all the sections of a healthcare center. The purpose of this research was to determine ...

متن کامل

Public-key Steganography with Authentication Public-key Steganography with Authentication

Steganography is the science of sending messages hidden in harmless communications over a public channel so that an adversary eavesdropping on the channel cannot even detect the presence of the hidden messages. Several models for steganography have been introduced. Some are private-key settings, and the others are public-key settings. In this paper, we propose a model of public-key steganograph...

متن کامل

Bio-Thentic Card: Authentication concept for RFID Card

Radio frequency identification (RFID) is a technology that employs basic identifier of an object embedded in a chip, transmitted via radio wave, for identification. An RFID Card responds to query/interrogation irrespective of ‘Who’ holds the Card; like a key to a door. Since an attacker can possess the card, access to such object can therefore be easily compromised. This security breach is clas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEJ Transactions on Electronics, Information and Systems

سال: 1987

ISSN: 0385-4221,1348-8155

DOI: 10.1541/ieejeiss1987.107.1_46