نتایج جستجو برای: smart card
تعداد نتایج: 95971 فیلتر نتایج به سال:
Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely limited in processing power and memory space. This paper describes a design and implementation of a software library providing smart card a...
Many security protocols rely on authentication of communicating entities and encryption of exchanged data. Traditionally, authentication and encryption have been separate processes, however there are combined solutions, referred to as authenticated-encryption (AE). The payment card industry is revising its protocol specifications and considering AE, however there has been uncertainty around per...
Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data over insecure channel. During the last couple of decades, many researchers have proposed a remote user authentication schemes which are ID-based, password-based, and smart card-based. Above all, smart card-based authentication schemes are becoming day by day more popular. One of the b...
Smart card technology has resulted in vast developments in many aspects of modern human life. User acceptance of fuel rationing smart cards based on adoption model involves many factors such as: satisfaction, security, external variables, attitude toward using, etc. In this study, user acceptance and security factors for fuel rationing smart cards in Iran have been evaluated based on an adoptio...
Over the last twenty years, the software in smart cards has radically changed. This has happened for several reasons, smart card software was initially rigid and monolithic and has now become more flexible with a clear separation between “operating system level” and “application level” parts. What is more, application-level resources are now much more accessible (nearly to end user level). Neve...
The Java Card Grid platform is a project carried out at LaBRI, Laboratoire Bordelais de Recherche en Informatique. It consists in setting up a platform composed of a large number of smart cards connected together by USB hubs and driven by PCs. The Java Card readers are assembled in a wall mount rack and are organized in a cluster-like architecture. The goal of the Java Card Grid project is to p...
This paper adapts the Unified Theory of Acceptance and Use Technology Model (UTAUT) to assess the factors impacting the adoption of smart cards in Medicaid Health Home context. We contribute to the theory by including three constructs specific to smart card and health devices: (i) concern for error, (ii) sickness orientation (iii) concern for data security. Utilizing a survey design we collecte...
In an open network environment, the remote authentication scheme using smart cards is a very practical solution to validate the legitimacy of a remote user. In 2003, Wu and Chieu presented a user-friendly remote authentication scheme using smart cards. Recently, Wang, Li, and Tie found that Wu–Chieu s scheme is vulnerable to the forged login attack, and then presented an improvement to eliminat...
Now-a-days Cryptographic smart cards are being used for most of the online transactions in many fields. But the security and the privacy of usage of these smart cards have been threatened by various attacks to hack the passwords of the smart card users. Since, small length passwords are easily accessible to hackers, users and organizations adapt to longer passwords or to change their passwords ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید