نتایج جستجو برای: health electronic card
تعداد نتایج: 1195692 فیلتر نتایج به سال:
In this paper, we aim to discuss various threats raised by Java Cards at various levels of the system. First, we address the Java Card platform security itself, from the chip security features to the Java Card virtual machine. Next, we expose how to deal with application security which is a standard problem for smart card manufacturers but a quite new one for third party Java developers beginni...
Despite a legal framework being in place for several years, the market share of qualified electronic signatures is disappointingly low. Mobile Signatures provide a new and promising opportunity for the deployment of an infrastructure for qualified electronic signatures. We analyzed two possible signing approaches (server based and client based signatures) and conclude that SIM-based signatures ...
There are numerous initiatives to use mobile devices as so-called “trusted pocket signers” to produce electronic signatures. The actual signature is generated by means of a conventional signature card. The mobile device serves as the card reader, storage device for the document to be signed and as a display for the signature application. The operating system used on the mobile device has thus a...
Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared as a technique for copyright protection which is compatible with buyer anonymity in electronic transactions. However, the complexity of known algorithms for anonymous fingerprinting is too high for practical implementation on sta...
Online payments in business-to-consumer electronic commerce are mainly made with credit cards. Fraud and chargebacks are a significant issue for merchants and payment card brands, due to widespread use of unsecured or partially secured credit card transactions. The Secure Electronic Transaction (SET) protocol may not only provide a high security level. It also enables productivity improvements ...
background and aims: beauty salons are considered as the places which the environmental health and renovation are adhered too. they can improve the society’s health and influence controlling the diseases. not considering this issue causes the spread of skin and hair diseases and infections and louse. this study was aimed to determine the health status of beauty salons of kashan in 2014. methods...
Medication error has been identified as a major factor affecting patient safety. Many innovative efforts such as Computerised Physician Order Entry (CPOE), a Pharmacy Information System, automated dispensing machines and Point of Administration Systems have been carried out with the aim of improving medication safety. However, areas remain that require urgent attention. One main area will be th...
Eliminating middlemen from security protocols helps less than one would think. EMV electronic payments, for example, can be made fairer by adding an electronic attorney – a middleman which mediates access to a customer’s card. We compare middlemen in crypto protocols and APIs with those in the real world, and show that a manin-the-middle defence is helpful in many circumstances. We suggest that...
There are many wonderful protocols in cryptography which are still waiting for their realization. Here we consider efficient solutions for secure electronic card games. Our contribution seems to be the first known practical implementation that requires no trusted third-party and simultaneously keeps the players’ strategies confidential. The provided open source library LibTMCG can be used for c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید