نتایج جستجو برای: smart card

تعداد نتایج: 95971  

2007
Detlef Hühnlein Manuel Bach

The forthcoming ISO/IEC 24727 series of standards defines application programming interfaces for smart cards and is expected to provide a major contribution to the global interoperability of smart cards and card-applications. However it assumes in part 2 [8] that certain information concerning the capabilities of the card and its (cryptographic) applications is stored on the card itself. As alr...

2006
Jianwu Zheng Mingsheng Liu Hui Liu

This paper is to leverage familiarity with smart card application, i.e. understanding and practical experiences of implementing trustworthy smart card application, to uncover secret veil surrounding the SOA-Based Web Services, and further develop and implement effective strategies for achieving trustworthy Web Services. Aspects being compared, of smart card application and SOA-Based Web Service...

1999
Gorazd Kandus Denis Trèek Roman Novak

Based on experience with Slovene Health Insurance Card System, the further development of smart-card based health care information systems is discussed. Emphasis is placed on required functionality starting with smart cards and ending with EDI technology on the other side. The current architecture is investigated in the light of emerging standards and commercial solutions from major software ve...

Journal: :IACR Cryptology ePrint Archive 2016
Yalin Chen Jue-Sam Chou Hung-Shen Wu

Recently, Farasha et al. proposed an efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. By using BAN-logic and AVISPA tools, they confirm the security properties of the proposed scheme. However, after analyzing, we determine that the scheme could not resist the smart card loss password guessing attack...

2009
Hamed Taherdoost Maslin Masrom Zuraini Ismail

Recently smart card is used all over the world in different applications such as financial, telecommunication, network, and physical access where the security is considered very crucial. User acceptance is very significant in successful implementation of smart card technology. Thus, in order to investigate the user adoption of the technology, the instrument to identify the user acceptance is ne...

2005
Takahiko Murayama Shuichiro Yamamoto

Among the several methods that enable fingerprint authentication of card holders, the one that executes the matehing process on the smart card chip is the most important. The Pattern matehing method, such as [1] , is of no use for smart cards, because it takes too much time to adjust the position between the input image and template image. So we have developed an algorithm (FTA: Free Turning Al...

1998
Steve Elliot Claudia Löbbecke

Based largely on its potential as an electronic cash substitute for low-value transactions, the market for smart-cards has been predicted to be US$9 billion by the year 2000. The numerous international pilot implementations of smart-card systems appear to support this prediction. Compared with the number of pilots, however, there has been remarkably few full scale rollouts of a broad-based prod...

Journal: :IACR Cryptology ePrint Archive 2010
Yalin Chen Jue-Sam Chou Chun-Hui Huang

In this paper, we use the ten security requirements proposed by Liao et al. for a smart card based authentication protocol to examine five recent work in this area. After analyses, we found that the protocols of Juang et al.¡s , Hsiang et al.¡s, Kim et al.¡s, and Li et al.¡s all suffer from offline password guessing attack if the smart card is lost, and the protocol of Xu et al.¡s is subjected ...

2007
Allan Tomlinson

The Trusted Platform Module (TPM) and smart card devices have many features in common. Both are low cost, tamper resistant, small footprint devices used to provide the basis of a secure computing environment. This chapter presents an introduction to the security mechanisms provided by the TPM highlighting those not typically found on a smart card. The concept of “ownership” is one of the major ...

2014
Fengtong Wen Dianli Guo Xuelei Li

In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme based on smart card which is believed to have many abilities to resist a range of network attacks. In this paper, we analyze the security of Lee’s scheme and show that the scheme is in fact insecure against insider-assisted attack, even if the adversary doesn’t know the secret information stored in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید