نتایج جستجو برای: health electronic card

تعداد نتایج: 1195692  

1999
Pierre GIRARD Jean-Louis LANET Pierre Girard Jean-Louis Lanet

In this paper, we aim to discuss various threats raised by Java Cards at various levels of the system. First, we address the Java Card platform security itself, from the chip security features to the Java Card virtual machine. Next, we expose how to deal with application security which is a standard problem for smart card manufacturers but a quite new one for third party Java developers beginni...

2004
Heiko Rossnagel

Despite a legal framework being in place for several years, the market share of qualified electronic signatures is disappointingly low. Mobile Signatures provide a new and promising opportunity for the deployment of an infrastructure for qualified electronic signatures. We analyzed two possible signing approaches (server based and client based signatures) and conclude that SIM-based signatures ...

2004
Tobias Murmann Heiko Rossnagel

There are numerous initiatives to use mobile devices as so-called “trusted pocket signers” to produce electronic signatures. The actual signature is generated by means of a conventional signature card. The mobile device serves as the card reader, storage device for the document to be signed and as a display for the signature application. The operating system used on the mobile device has thus a...

1998
Josep Domingo-Ferrer Jordi Herrera-Joancomartí

Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared as a technique for copyright protection which is compatible with buyer anonymity in electronic transactions. However, the complexity of known algorithms for anonymous fingerprinting is too high for practical implementation on sta...

2000
Michael Fritscher Oliver Kump

Online payments in business-to-consumer electronic commerce are mainly made with credit cards. Fraud and chargebacks are a significant issue for merchants and payment card brands, due to widespread use of unsecured or partially secured credit card transactions. The Secure Electronic Transaction (SET) protocol may not only provide a high security level. It also enables productivity improvements ...

Journal: :international journal of epidemiology research 0
rouhullah dehghani social determinants of health (sdh) research center, environment health dept., kashan university of medical sciences, kashan, i.r. iran leila mesgari social determinants of health (sdh) research center, environment health dept., kashan university of medical sciences, kashan, i.r. iran mohsen fathi moghadam environmental health unit, deputy of health, kashan university of medical sciences, kashan, i.r. iran fereshteh rezaian social determinants of health (sdh) research center, environment health dept., kashan university of medical sciences, kashan, i.r. iran fereshteh nasudian social determinants of health (sdh) research center, environment health dept., kashan university of medical sciences, kashan, i.r. iran elham sudayfian social determinants of health (sdh) research center, environment health dept., kashan university of medical sciences, kashan, i.r. iran mojtaba babai

background and aims: beauty salons are considered as the places which the environmental health and renovation are adhered too. they can improve the society’s health and influence controlling the diseases. not considering this issue causes the spread of skin and hair diseases and infections and louse. this study was aimed to determine the health status of beauty salons of kashan in 2014. methods...

Journal: :The Australasian medical journal 2013
Renukha Sellappans Siew Siang Chua Nur Amani Ahmad Tajuddin Pauline Siew Mei Lai

Medication error has been identified as a major factor affecting patient safety. Many innovative efforts such as Computerised Physician Order Entry (CPOE), a Pharmacy Information System, automated dispensing machines and Point of Administration Systems have been carried out with the aim of improving medication safety. However, areas remain that require urgent attention. One main area will be th...

2006
Ross J. Anderson

Eliminating middlemen from security protocols helps less than one would think. EMV electronic payments, for example, can be made fairer by adding an electronic attorney – a middleman which mediates access to a customer’s card. We compare middlemen in crypto protocols and APIs with those in the real world, and show that a manin-the-middle defence is helpful in many circumstances. We suggest that...

2005
Heiko Stamer

There are many wonderful protocols in cryptography which are still waiting for their realization. Here we consider efficient solutions for secure electronic card games. Our contribution seems to be the first known practical implementation that requires no trusted third-party and simultaneously keeps the players’ strategies confidential. The provided open source library LibTMCG can be used for c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید