نتایج جستجو برای: smart health card
تعداد نتایج: 1067158 فیلتر نتایج به سال:
Multi-application smart card technology facilitates applications to securely share their data and functionality. The security enforcement and assurance in application sharing is provided by the smart card firewall. The firewall mechanism is well defined and studied in the Issuer Centric Smart Card Ownership Model (ICOM), in which a smart card is under total control of its issuer. However, it is...
Smart cards are being integrated into a diverse range of industries: ranging from banking, telecom, transport, home/office access control to health and E-passport. Traditionally, cardholders are required to carry a smart card for each application. However, recent developments in the Near Field Communication (NFC) have renewed the interest in multiple applications for different services on a sin...
Student loans and credit card loans represent important components of young households’ portfolios in the United States. While default rates on credit card debt are at historically low levels, default rates on student loans have increased significantly in recent years. There are important institutional differences between bankruptcy arrangements and default consequences in the two markets, whic...
Identification and authentication by individuals' biometric characteristics is becoming an accepted procedure that is slowly replacing the most popular identification procedure – passwords. Rapid progress of biometric technology and its expanded application brings new possibilities in identification process. The usage of biometric smart card in the process of identification and authentication i...
It is common for random number generators to be tested with empirical tests. Since most of these tests have been designed solely for software implementation, implementing them in hardware may not be practical. This paper will look at the hardware implemention of seven popular tests. The area, time delay, and power consumption characteristics of each test will be compared. These three criteria w...
Authentication is one of the essential security features in network communication. Authentication process ascertains the legitimacy of the communicating partners in communication. In authentication process, the originator of the communication and the respondent transacts some identification codes of each other prior to start of the message transaction. Several methods have been proposed regardi...
In this paper we describe the Secure Method Invocation (SMI) framework implemented for Jason, our Javacard As Secure Objects Networks platform. Jason realises the secure object store paradigm, that reconciles the card-as-storage-element and card-as-processing-element views. In this paradigm, smart cards are viewed as secure containers for objects, whose methods can be called straightforwardly a...
Yoon et al. proposed a new efficient remote user authentication scheme using smart cards in 2004. This paper analyzes the proposed scheme and then proves that the password change phase of Yoon et al’s scheme is still insecure.
ETRI Journal, Volume 30, Number 1, February 2008 Since many efficient algorithms for implementing pairings have been proposed such as ηT pairing and the Ate pairing, pairings could be used in constraint devices such as smart cards. However, the secure implementation of pairings has not been thoroughly investigated. In this paper, we investigate the security of ηT pairing over binary fields in t...
Cloud is a concept of accessing the data from their own datacenters such that the chances of eavesdropping have been reduced and storage cost is reduced. Here in this paper we are giving a brief survey of various cloud based technique implemented so far. Although there are various techniques implemented so far for the cloud computing but here we are giving a survey of not only cloud based techn...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید