نتایج جستجو برای: smart health card

تعداد نتایج: 1067158  

2013
Hafid Mammass

we treat in this paper a secure authentication method using watermarking, smart card and cryptography. It can serve to control logical and physical access and the network access and to prove the card owner identity.This method is very secure because the high level of security of smart card, the method of watermarking and detection and the complexity of the algorithm RSA and DES aim to remove th...

Journal: :Computers in biology and medicine 2015
Shaurya Jauhari S. A. M. Rizvi

Acknowledging the successful sequencing of the human genome and the valuable insights it has rendered, genetic drafting of non-human organisms can further enhance the understanding of modern biology. The price of sequencing technology has plummeted with time, and there is a noticeable enhancement in its implementation and recurrent usage. Sequenced genome information can be contained in a micro...

2001
Derek W. M. Sin Henry C. B. Chan

It is expected that the next generation of smart card will be more intelligent, more interactive and more interoperable. We call these the 3i requirements. A smart card wallet system for meeting these 3i requirements is presented. A novel objectoriented framework is proposed, such that everything is stored in the smart card wallet as an object and the extensible markup language (XML) is employe...

2012
Marc Joye

Smart card technologies have had a huge impact on the development of cryptographic techniques for commercial applications. The first cryptographic smart card was introduced in 1979. It implemented the Telepass 1 one-way function using 200 bytes! Next came smart cards with secret-key and public-key capabilities, respectively in 1985 and 1988. Implementing an RSA computation on a smart card was (...

2005
Chunlei Yang Gui Yun Tian Steve Ward

Fingerprint has been increasingly used in authentication applications. Smart card is becoming more and more common and is moving toward a multi-function era. The integration of biometric and smart card is a trend for the future of smart card. As a part of our research project which concerns a novel security card, we propose to integrate the fingerprint sensor with the smart card instead of the ...

2017
Narendra Singh Panwar Manmohan Singh Rauthan Amit Agarwal

To secure the resources or information from illegitimate users various kinds of authentication schemes have been designed and developed. Some of these schemes are vulnerable to a variety of attacks. In last decade authentication schemes based on smart card has been proposed to withstand the possible attacks on verification table. Smart card provides a convenient storage and processing capabilit...

2004
Konstantinos Markantonakis Keith Mayes

Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microprocessors and the complexities introduced by the operation of a PKI infrastructure. In this paper we analyse the significance of public key secure channel protocols in multi-application smart cards. We believe that multi-ap...

Journal: :IEEE Intelligent Systems 2002
Shiu Kit Tso Ka Lun Fan Yongde Zhang Chun Man Chan

The user terminal The terminal provides a simple user interface consisting of a smart card system, keyboard, monitor, and printer. After inserting a smart card into the smart-card reader, the user keys in a password and selects the kind and amount of fuel. The user can check the smart card’s records and updated status. During refueling, the monitor displays the procedure’s progress. The printer...

Journal: :Inf. Sec. Techn. Report 1999
Pierre Girard Jean-Louis Lanet

The methods, languages and tools for developing a smart card system share some characteristics with those of the embedded domain. Until recently, smart card programs were written in hand coded native assembly language. All programs (drivers, operating system, libraries, applications) were developed as a monolithic piece of code burned in the smart card ROM. Therefore, not only are traditional c...

2008
Paul A. Karger David C. Toll Elaine R. Palmer Suzanne K. McIntosh Samuel M. Weber Samuel Weber

The ever-increasing computational power of smart cards has made them feasible for applications like electronic passports and military id cards. However, these applications require a secure smart card operating system. In this paper we argue that smart card platforms pose additional security challenges than traditional computer platforms. We discuss our design for a secure smart card operating s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید