نتایج جستجو برای: smart card

تعداد نتایج: 95971  

Journal: :IJISP 2011
Ahmed Patel Kenan Kalajdzic Laleh Golafshan

Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely limited in processing power and memory space. This paper describes a design and implementation of a software library providing smart card a...

2017
Keith Mayes

Many security protocols rely on authentication of communicating entities and encryption of exchanged data. Traditionally, authentication and encryption have been separate processes, however there are combined solutions, referred to as authenticated-encryption (AE). The payment card industry is revising its protocol specifications and considering AE, however there has been uncertainty around per...

2015
Jongho Mun Jiye Kim Donghoon Lee Jaewook Jung Younsung Choi Dongho Won

Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data over insecure channel. During the last couple of decades, many researchers have proposed a remote user authentication schemes which are ID-based, password-based, and smart card-based. Above all, smart card-based authentication schemes are becoming day by day more popular. One of the b...

Journal: :CoRR 2013
Seyed Gholamreza Eslami Ali Peiravi Behzad Molavi

Smart card technology has resulted in vast developments in many aspects of modern human life. User acceptance of fuel rationing smart cards based on adoption model involves many factors such as: satisfaction, security, external variables, attitude toward using, etc. In this study, user acceptance and security factors for fuel rationing smart cards in Iran have been evaluated based on an adoptio...

2002
Damien Deville Antoine Galland Gilles Grimaud Sébastien Jean

Over the last twenty years, the software in smart cards has radically changed. This has happened for several reasons, smart card software was initially rigid and monolithic and has now become more flexible with a clear separation between “operating system level” and “application level” parts. What is more, application-level resources are now much more accessible (nearly to end user level). Neve...

2006
Serge Chaumette Achraf Karray Damien Sauveron

The Java Card Grid platform is a project carried out at LaBRI, Laboratoire Bordelais de Recherche en Informatique. It consists in setting up a platform composed of a large number of smart cards connected together by USB hubs and driven by PCs. The Java Card readers are assembled in a wall mount rack and are organized in a cluster-like architecture. The goal of the Java Card Grid project is to p...

2016
Pamella Howell Raj Sharman Sanjukta Das Mohamed Abdelhamid

This paper adapts the Unified Theory of Acceptance and Use Technology Model (UTAUT) to assess the factors impacting the adoption of smart cards in Medicaid Health Home context. We contribute to the theory by including three constructs specific to smart card and health devices: (i) concern for error, (ii) sickness orientation (iii) concern for data security. Utilizing a survey design we collecte...

Journal: :Applied Mathematics and Computation 2005
Da-Zhi Sun Ji-Dong Zhong Yu Sun

In an open network environment, the remote authentication scheme using smart cards is a very practical solution to validate the legitimacy of a remote user. In 2003, Wu and Chieu presented a user-friendly remote authentication scheme using smart cards. Recently, Wang, Li, and Tie found that Wu–Chieu s scheme is vulnerable to the forged login attack, and then presented an improvement to eliminat...

2013
G. PRAKASH Dr. M. KANNAN

Now-a-days Cryptographic smart cards are being used for most of the online transactions in many fields. But the security and the privacy of usage of these smart cards have been threatened by various attacks to hack the passwords of the smart card users. Since, small length passwords are easily accessible to hackers, users and organizations adapt to longer passwords or to change their passwords ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید