نتایج جستجو برای: smart card

تعداد نتایج: 95971  

2008
Hyo Kim

To provide subscription-based Digital TV (DTV) data, services providers scramble the data stream (program content) with some secure measures such as ECM and EMM via using control words, and send the stream to conditional access system (CAS) in the set-top box (STB). Smart card is used to decrypt the control words and accordingly to enable the STB to descramble the scrambled signal. Therefore, s...

Journal: :Inf. Sci. 2015
Raja Naeem Akram Konstantinos Markantonakis Damien Sauveron

Multi-application smart card technology has gained momentum due to the Near Field Communication (NFC) and smart phone revolution. Enabling multiple applications from di erent application providers on a single smart card is not a new concept. Multi-application smart cards have been around since the late 1990s; however, uptake was severely limited. NFC has recently reinvigorated the multi-applica...

2007
Dennis Vermoen Marc F. Witteman Georgi Gaydadjiev

Power analysis on smart cards is widely used to obtain information about implemented cryptographic algorithms. We propose similar methodology for Java Card applets reverse engineering. Because power analysis alone does not provide enough information, we refine our methodology by involving additional information sources. Issues like distinguishing between bytecodes performing similar tasks and r...

Journal: :IEEE Internet Computing 2002
Alvin T. S. Chan Florine Tse Jiannong Cao Hong Va Leong

With the increasing use of the Web as the platform for online e-commerce applications, smart card technology presents an attractive solution for providing security and access control mechanisms for processing online transactions. A user can insert the smart card into a reader attached to a terminal that provides Web access and client-side processing capabilities; the card performs all processin...

2002
Damien DEVILLE Gilles GRIMAUD Damien Deville Gilles Grimaud

Java is the ideal development platform for mobile code systems. It ensures application portability and mobility for a variety of platforms, while providing strong security features. The intermediate code (byte code) allows us to verify statically (i.e. during loading phase) that the program is trustworthy. This is done by a software security module called the byte code verifier. Given the compl...

Journal: :Nature 2006

Journal: :International Journal of Engineering Applied Sciences and Technology 2020

Journal: :International Journal for Research in Applied Science and Engineering Technology 2020

2008
Mohammad Mesbah Uddin Salahuddin Muhammad Salim Zabir Yasunobu Nohara Hiroto Yasuura

Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for such authentic program modification. In our framework, before issuing a smart card to an individual, the card issuer stores a unique long bit string called PID on the card. From th...

2006
Asad M. Ali

This paper describes the motivation and technological innovation of Network Smart Card, a next generation smart card architecture that supports standard Internet communication and security protocols. It outlines the role of these next generation smart cards in addressing some of the weaknesses inherent in current Internet authentication frameworks. The paper evaluates several common methods of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید