نتایج جستجو برای: smart health card
تعداد نتایج: 1067158 فیلتر نتایج به سال:
we treat in this paper a secure authentication method using watermarking, smart card and cryptography. It can serve to control logical and physical access and the network access and to prove the card owner identity.This method is very secure because the high level of security of smart card, the method of watermarking and detection and the complexity of the algorithm RSA and DES aim to remove th...
Acknowledging the successful sequencing of the human genome and the valuable insights it has rendered, genetic drafting of non-human organisms can further enhance the understanding of modern biology. The price of sequencing technology has plummeted with time, and there is a noticeable enhancement in its implementation and recurrent usage. Sequenced genome information can be contained in a micro...
It is expected that the next generation of smart card will be more intelligent, more interactive and more interoperable. We call these the 3i requirements. A smart card wallet system for meeting these 3i requirements is presented. A novel objectoriented framework is proposed, such that everything is stored in the smart card wallet as an object and the extensible markup language (XML) is employe...
Smart card technologies have had a huge impact on the development of cryptographic techniques for commercial applications. The first cryptographic smart card was introduced in 1979. It implemented the Telepass 1 one-way function using 200 bytes! Next came smart cards with secret-key and public-key capabilities, respectively in 1985 and 1988. Implementing an RSA computation on a smart card was (...
Fingerprint has been increasingly used in authentication applications. Smart card is becoming more and more common and is moving toward a multi-function era. The integration of biometric and smart card is a trend for the future of smart card. As a part of our research project which concerns a novel security card, we propose to integrate the fingerprint sensor with the smart card instead of the ...
To secure the resources or information from illegitimate users various kinds of authentication schemes have been designed and developed. Some of these schemes are vulnerable to a variety of attacks. In last decade authentication schemes based on smart card has been proposed to withstand the possible attacks on verification table. Smart card provides a convenient storage and processing capabilit...
Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microprocessors and the complexities introduced by the operation of a PKI infrastructure. In this paper we analyse the significance of public key secure channel protocols in multi-application smart cards. We believe that multi-ap...
The user terminal The terminal provides a simple user interface consisting of a smart card system, keyboard, monitor, and printer. After inserting a smart card into the smart-card reader, the user keys in a password and selects the kind and amount of fuel. The user can check the smart card’s records and updated status. During refueling, the monitor displays the procedure’s progress. The printer...
The methods, languages and tools for developing a smart card system share some characteristics with those of the embedded domain. Until recently, smart card programs were written in hand coded native assembly language. All programs (drivers, operating system, libraries, applications) were developed as a monolithic piece of code burned in the smart card ROM. Therefore, not only are traditional c...
The ever-increasing computational power of smart cards has made them feasible for applications like electronic passports and military id cards. However, these applications require a secure smart card operating system. In this paper we argue that smart card platforms pose additional security challenges than traditional computer platforms. We discuss our design for a secure smart card operating s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید