نتایج جستجو برای: ژن card
تعداد نتایج: 40692 فیلتر نتایج به سال:
Smart cards have been deployed as trusted components in a wide range of industries. The basis of the trust on a smart card platform and applications is static and evaluated before the card issuance to cardholders. A dynamic and post-issuance security assurance and validation mechanism can be useful, but it is not considered necessary in the Issuer Centric Smart Card Ownership Model. However, in...
Power analysis on smart cards is widely used to obtain information about implemented cryptographic algorithms. We propose similar methodology for Java Card applets reverse engineering. Because power analysis alone does not provide enough information, we refine our methodology by involving additional information sources. Issues like distinguishing between bytecodes performing similar tasks and r...
The predominant smart card ownership model is the issuer centric, and it has played a vital role in the proliferation of the technology. However, recent developments of multi-application smart card technology lead to new potential ownership models. One of the possible models is the User Centric Smart Card Ownership Model. In this model, the ownership is with smart card users. To support user’s ...
This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web applications that require smart card authentication. This also enables users to access these applications from browsers and machines that do not have the capability to use a smart...
E-commerce customers may have a problem when paying for the purchase of a major item, if its price is larger than the available credit on their credit card. In the brick and mortar world, this problem would be solved by paying part of the bill with cash or with a second credit card. In e-commerce, however, this has not been an option. Furthermore, even when a customer could pay the whole purcha...
A new approach for the visual specification of component-based software systems is proposed. The main idea is to employ two visual representations the I-card (information card) and the C-card (control card) together to specify a component-based software system. This approach is especially useful in the specification and design of component-based slow intelligence systems. This approach is curre...
RIG-I activates interferon signaling pathways by promoting filament formation of the adaptor molecule, MAVS. Assembly of the MAVS filament is mediated by its CARD domain (CARD(MAVS)), and requires its interaction with the tandem CARDs of RIG-I (2CARD(RIG-I)). However, the precise nature of the interaction between 2CARD(RIG-I) and CARD(MAVS), and how this interaction leads to CARD(MAVS) filament...
-------------------------------------------------------------------ABSTRACT---------------------------------------------------With the emergence of internet and e-commerce, the use of credit card is an unavoidable one. The credit cards are used for purchasing goods and services. We can make both online and offline payment easily with the help of credit cards. For online transaction it uses virt...
Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest computing platforms in use today. The memory configuration of a smart card are of t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید