نتایج جستجو برای: smart card

تعداد نتایج: 95971  

Journal: :مجله تحقیقات سلامت 0
مهدی برخورداری فیروزآبادی mahdi barkhordari firouzabadi شهریار محمدی shahriar mohammadi

abstract following the advances in mobile communication and information technology, smart phones have been used in a wide variety of commercial, social, entertainment, file sharing and health transactions and applications. the current procedures in healthcare environment for patient registration, appointment scheduling and payment are time consuming and somehow tiresome. traditionally, patients...

Journal: :Computer and Information Science 2010
Qijie Sheng Xin Tong Xiangyang Song Zhihao Zhang Jun Xu

The whole framework of the new generation campus smart card system based on the mobile communication is designed in this article, and it realizes two technical breakthroughs when it could remain compatible with the existing campus smart card system platform. The first technology is that the design could use the wireless POS based on GPRS network to substitute the wire POS to implement the onlin...

Journal: :Electr. Notes Theor. Comput. Sci. 2007
Bruno Emerson Gurgel Gomes Anamaria Martins Moreira David Déharbe

This work proposes a methodology for the rigorous development of Java Card smart card applications, using the B Method. Its main feature is to abstract the particularities of Java Card and smart card aware applications from the specifier as much as possible. In the proposed approach, the specification of the aplication logic needs not be preoccupied with the specific aspects of the Java Card pl...

2004
Hoon-Jae Lee ManKi Ahn Seongan Lim Sang-Jae Moon

In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the side channel attacks for the smart card and similar security evaluation criteria for smart card protection profiles based on the common criterion. Futhermore, we proposes the smart card security evaluation criteria f...

2013
Kai Chain Wen-Chung Kuo Jiin-Chiou Cheng

Smart card based password for authentication has become a common trend. Although smart card brings conveniences, it also increases the risk in the case of lost cards. In other words, when the smart card is possessed by an attacker, the attacker will possibly attempt to analyze the secret information within the smart card to deduce the authentication mechanism of the server and then forge user c...

2003
Tommaso Cucinotta Marco Di Natale David Corcoran

This paper presents an open protocol for interoperability across multi-vendor programmable smart cards. It allows exposition of on-card storage and cryptographic services to host applications in a unified, card-independent way. Its design, inspired by the standardization of on-card Java language and cryptographic API, has been kept as generic and modular as possible. The protocol security model...

2011
Chun-Ta Li Cheng-Chi Lee Chen-Ju Liu Chin-Wen Lee

Remote user authentication is important to identify whether communicating parties are genuine and trustworthy using the password and the smart card between a login user and a remote server. Recently, we find that Kim et al.’s password-based authentication scheme [1] assume that the attacker cannot extract the secret information of the smart card. However, in reality, the authors in [2,8] show t...

2011
Wojciech Mostowski Pim Vullers

In this paper we discuss an efficient implementation of anonymous credentials on smart cards. In general, privacy-preserving protocols are computationally intensive and require the use of advanced cryptography. Implementing such protocols for smart cards involves a trade-off between the requirements of the protocol and the capabilities of the smart card. In this context we concentrate on the im...

2013
Raja Naeem Akram Konstantinos Markantonakis Keith Mayes

User Centric Smart Card Ownership Model (UCOM) gives the freedom of choice of respective applications to the smart card users. The user-centric architecture requires a trusted entity to be present on the smart card to provide security assurance and validation to the requesting application providers. In this paper, we propose the inclusion of a trusted computing platform for smart cards that we ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید