نتایج جستجو برای: smart health card

تعداد نتایج: 1067158  

2007
Detlef Hühnlein Manuel Bach

The forthcoming ISO/IEC 24727 series of standards defines application programming interfaces for smart cards and is expected to provide a major contribution to the global interoperability of smart cards and card-applications. However it assumes in part 2 [8] that certain information concerning the capabilities of the card and its (cryptographic) applications is stored on the card itself. As alr...

2006
Jianwu Zheng Mingsheng Liu Hui Liu

This paper is to leverage familiarity with smart card application, i.e. understanding and practical experiences of implementing trustworthy smart card application, to uncover secret veil surrounding the SOA-Based Web Services, and further develop and implement effective strategies for achieving trustworthy Web Services. Aspects being compared, of smart card application and SOA-Based Web Service...

Journal: :IACR Cryptology ePrint Archive 2016
Yalin Chen Jue-Sam Chou Hung-Shen Wu

Recently, Farasha et al. proposed an efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. By using BAN-logic and AVISPA tools, they confirm the security properties of the proposed scheme. However, after analyzing, we determine that the scheme could not resist the smart card loss password guessing attack...

2005
Takahiko Murayama Shuichiro Yamamoto

Among the several methods that enable fingerprint authentication of card holders, the one that executes the matehing process on the smart card chip is the most important. The Pattern matehing method, such as [1] , is of no use for smart cards, because it takes too much time to adjust the position between the input image and template image. So we have developed an algorithm (FTA: Free Turning Al...

1998
Steve Elliot Claudia Löbbecke

Based largely on its potential as an electronic cash substitute for low-value transactions, the market for smart-cards has been predicted to be US$9 billion by the year 2000. The numerous international pilot implementations of smart-card systems appear to support this prediction. Compared with the number of pilots, however, there has been remarkably few full scale rollouts of a broad-based prod...

Journal: :IACR Cryptology ePrint Archive 2010
Yalin Chen Jue-Sam Chou Chun-Hui Huang

In this paper, we use the ten security requirements proposed by Liao et al. for a smart card based authentication protocol to examine five recent work in this area. After analyses, we found that the protocols of Juang et al.¡s , Hsiang et al.¡s, Kim et al.¡s, and Li et al.¡s all suffer from offline password guessing attack if the smart card is lost, and the protocol of Xu et al.¡s is subjected ...

2007
Allan Tomlinson

The Trusted Platform Module (TPM) and smart card devices have many features in common. Both are low cost, tamper resistant, small footprint devices used to provide the basis of a secure computing environment. This chapter presents an introduction to the security mechanisms provided by the TPM highlighting those not typically found on a smart card. The concept of “ownership” is one of the major ...

2012
Khyati Chaudhary Bhawna Mallick

Data mining has been increasing as one of the chief key features of many security initiatives. Often, used as a means for detection of fraud, assessing risk as well. Data mining involves the use of data analysis tools to discover unknown, valid patterns as well as relationships in large data sets. Decades have seen a massive growth in the use of credit cards as a transactional medium. Data mini...

2014
Fengtong Wen Dianli Guo Xuelei Li

In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme based on smart card which is believed to have many abilities to resist a range of network attacks. In this paper, we analyze the security of Lee’s scheme and show that the scheme is in fact insecure against insider-assisted attack, even if the adversary doesn’t know the secret information stored in...

2002
Susan Shaheen

Introduction During this century several transportation modes, including transit, personal automobiles, and airplanes, have competed for market share. Despite this competition, the personal vehicle has become the dominant form of mobility in many countries throughout Europe and North America. In turn, public transit has found it increasingly difficult to attract and retain passengers. This pape...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید