Authentication Method for Electronic Contracts with IC Card Key Managemant
نویسندگان
چکیده
منابع مشابه
Authentication and Key Agreement Method for Home Networks Using a Smart Card
Authentication is the most important issue to control the home networks remotely. In this paper, a strong authentication and key agreement method for a smart home network system is presented. The proposed scheme uses a smart card which stores private information and performs cryptic operations. It also uses a modified 3GPP security system that is suitable for the home network. Our scheme provid...
متن کاملDynamic Encryption Key based Smart Card Authentication Scheme
In order to keep away from difficulties associated with traditional password based authentication methods, smart card based authentication schemes have been widely used. It has already been accepted worldwide due to its low computational cost. However, most of these schemes are vulnerable to one or the other possible attack. This paper describes a new smart card authentication scheme using symm...
متن کاملMinimum data set for electronic health card of schizophrenia
Purpose: Having a clinical information system is a good solution for monitoring medical problems. This system is designed to improve the speed and accuracy of data management. The goal is to replace medical records with a clinical information system to support storing, processing and distributing data in all the sections of a healthcare center. The purpose of this research was to determine ...
متن کاملPublic-key Steganography with Authentication Public-key Steganography with Authentication
Steganography is the science of sending messages hidden in harmless communications over a public channel so that an adversary eavesdropping on the channel cannot even detect the presence of the hidden messages. Several models for steganography have been introduced. Some are private-key settings, and the others are public-key settings. In this paper, we propose a model of public-key steganograph...
متن کاملBio-Thentic Card: Authentication concept for RFID Card
Radio frequency identification (RFID) is a technology that employs basic identifier of an object embedded in a chip, transmitted via radio wave, for identification. An RFID Card responds to query/interrogation irrespective of ‘Who’ holds the Card; like a key to a door. Since an attacker can possess the card, access to such object can therefore be easily compromised. This security breach is clas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEJ Transactions on Electronics, Information and Systems
سال: 1987
ISSN: 0385-4221,1348-8155
DOI: 10.1541/ieejeiss1987.107.1_46