نتایج جستجو برای: smart card

تعداد نتایج: 95971  

Journal: :IACR Cryptology ePrint Archive 2013
Ding Wang Ping Wang

The design of secure and efficient smart-card-based password authentication schemes remains a challenging problem today despite two decades of intensive research in the security community, and the current crux lies in how to achieve truly two-factor security even if the smart cards can be tampered. In this paper, we analyze two recent proposals, namely, Hsieh-Leu’s scheme and Wang’s PSCAV schem...

2013
G. Prakash M. Kannan

Today, most authenticating applications using passwords are being compromised and the risk is becoming higher because it's becoming easier to download tools that will crack them. Passwords are no longer sufficient, as threats against them increase in large quantity. With the growing use of internet to access information resources, government and private agencies are now moving to replace passwo...

2004
Nadia Bel Hadj Aissa Christophe Rippert Damien Deville Gilles Grimaud

Smart card operating systems have to face very hard constraints in terms of available memory space and computing power. Nonetheless, the specifications of most smart card platforms impose strict deadlines for communications between the card and the terminal to which it is connected. This advocates the real time paradigm to guarantee response times and thus introduces the need for computation of...

2013
Pim Vullers Gergely Alpár

In this paper we discuss an efficient implementation for selective disclosure of attribute-based credentials on smart cards. In this context we concentrate on the implementation of this core feature of IBM’s Identity Mixer (Idemix) technology. Using the MULTOS platform we are the first to provide this feature on a smart card. We compare Idemix with Microsoft’s U-Prove technology, as the latter ...

2002
Stefano Zanero

Smart Cards are often touted as “secure” portable storage devices. A complete, high-level design metodology has been proposed for embedded information systems based on smart card devices. However, this metodology takes as granted that informations stored on the card will be really securely stored, and access control will be correctly maintained. Unfortunately, standards and specifications, crea...

2000
J. Cazin V. Wiels G. Zanon

The paper describes the status of a joint project between Gemplus and ONERA. Gemplus developed an electronic purse running on Java enabled smart cards. The project goal is to verify security properties that should be enforced by the applets involved in this application. A security policy has been de ned that associates levels to applet attributes and methods and de nes authorized ows between le...

2000
Antoine Requet Ludovic Casset Gilles Grimaud

Smart cards are credit-card sized devices embedding a microprocessor. They are typically used to provide security to an information system. Open cards are smart cards able to download code after their issuance. The card security is usually ensured by a third party that sends a cryptographic certificate with the code to authenticate it. On-card code verification could be a solution for improving...

1999
Patrick C. K. Hung Kamalakar Karlapalem

These days smart cards are replacing traditional magnetic cards for payment transactions. One of the main reasons is the enhanced security capabilities built into a smart card. Most of the related works in smart card only concentrates on the single application such as network access control, prepaid phone card or debit card. With popularity in web technologies, there is a trend towards smart ca...

2008
Y. Asakura T. Iryo Y. Nakajima T. Kusakabe Y. Takagi M. Kashiwadani

Smart card systems have been spreading globally not only for purchasing general goods and services, but also for fare payment of public transport. When an individual traveller is holding a public transport smart card, the precise times of his/her passing through ticket gates are recorded in the smart card system. The longitudinal smart card data of a large number of passengers have been stored ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید