نتایج جستجو برای: health electronic card

تعداد نتایج: 1195692  

2013
Tobias Wich Moritz Horsch Dirk Petrautzki Johannes Schmölz Detlef Hühnlein Thomas Wieland Simon Potzernheim

The present paper introduces an extensible client platform, which can be used for eID, electronic signatures and many more smart card enabled applications.

Journal: :Bulletin of the World Health Organization 2005
Richard Alvarez

The last 12 months could be dubbed the international year of electronic health records, as electronic health information systems have been identified as a critical ingredient for reinvigorating health care in country after country. In his State of the Union address last year, United States President Bush set the goal of having such records for every person within 10 years. Similar initiatives a...

2009
Ali Sunyaev Stefan Göttlinger Christian Mauro Jan Marco Leimeister Helmut Krcmar

The electronic health card (EHC) is presently being introduced in Germany, however in a much slower pace than originally anticipated and planned. For an evaluation of the applications of EHC a doctor ́s practice of a dentist was chosen as reference practice. To analyze the direct effect of the EHC, a process analysis was made of the actual and future EHC processes. For exploring potential user a...

Journal: :Studies in health technology and informatics 2009
Tomaz Marcun

In 2009 the Slovenian healthcare and health insurance sector is implementing a national system for the secure on-line exchange of administrative and medical data. All general practitioners, hospitals, pharmacies and other healthcare providers will connect their information systems to this electronic service. Solutions have been built upon, as well as the renovation of the existing well recogniz...

2005
Gerrit Bleumer

In a general business sense, an electronic wallet (or electronic purse) is a consumer device providing some additional security compared to a mere credit card solution. An electronic wallet could be as simple as an encrypted storage of credit card information that saves consumers to re-enter their credit card data manually each time they make a payment. There is a considerable variety of produc...

2004
P. T. Blythe

The use of an electronic smart card as an alternative means for users to access and pay for transport services is now emerging as a viable option for many operators. With the recent introduction of the Oyster smart card by Transport for London and the plans by a number of passenger transport executives and transport operators to launch smart-card ticketing, the UK is on the verge of an influx o...

2008
Paul A. Karger David C. Toll Elaine R. Palmer Suzanne K. McIntosh Samuel M. Weber Samuel Weber

The ever-increasing computational power of smart cards has made them feasible for applications like electronic passports and military id cards. However, these applications require a secure smart card operating system. In this paper we argue that smart card platforms pose additional security challenges than traditional computer platforms. We discuss our design for a secure smart card operating s...

2002
M. Osterman

Simulated guided testing is introduced as a process for evaluating the life expectancy of electronic hardware and for developing and assessing the effectiveness of physical tests. An avionic circuit card assembly is examined as a demonstration vehicle for the process. Simulation techniques are used to assess effectiveness of physical tests on the avionic circuit card assembly. The impact of com...

2012
Ajeet Singh Karan Singh

In this paper we review a secure electronic payment system for Internet transaction. The electronic payment system is to be secure for Internet transaction participants such as Payment gateway server, Bank sever and Merchant server. The security architecture of the system is designed by using Many Security Protocols and techniques, which eliminates the fraud that occurs today with stolen credit...

2000
Adi Shamir

Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their internal programs. It is a passive attack in the sense that it can be applied in an undetectable way during normal interaction with the smart card without modifying the card or the protocol in any way. The attack is particul...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید