نتایج جستجو برای: smart health card

تعداد نتایج: 1067158  

2015
Kevin E. Foltz William R. Simpson

This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web applications that require smart card authentication. This also enables users to access these applications from browsers and machines that do not have the capability to use a smart...

2010
Petr Švenda

The availability of programmable cryptographic smart cards provides possibility to run application in significantly more secured environment then ordinary personal computer. Smart card platforms like Java Card or .NET allow to implement portable applications that can be run on different smart card hardware. Barriers for a skilled Java developer switching to the Java Card platform are relatively...

2011
Cristian TOMA

In this paper, are highlighted concepts as: complete Java card application, life cycle of an applet, and a practical electronic wallet sample implemented in Java card technology. As a practical approach it would be interesting building applets for ID, Driving License, Health-Insurance smart cards, for encrypt and digitally sign documents, for E-Commerce and for accessing critical resources in g...

Journal: :Journal of Object Technology 2004
Won Kim

The smart card has a microprocessor or a memory chip embedded in a plastic card. It has been in wide use in Europe and Japan for payment, entry into buildings and computer systems, and storage and access of special types of information. In the US, despite efforts by the credit card industry, the smart card has not been nearly as widely adopted as in Europe and Japan. In this article, we will re...

Journal: :Computer and Information Science 2010
Qijie Sheng Xin Tong Xiangyang Song Zhihao Zhang Jun Xu

The whole framework of the new generation campus smart card system based on the mobile communication is designed in this article, and it realizes two technical breakthroughs when it could remain compatible with the existing campus smart card system platform. The first technology is that the design could use the wireless POS based on GPRS network to substitute the wire POS to implement the onlin...

Journal: :Electr. Notes Theor. Comput. Sci. 2007
Bruno Emerson Gurgel Gomes Anamaria Martins Moreira David Déharbe

This work proposes a methodology for the rigorous development of Java Card smart card applications, using the B Method. Its main feature is to abstract the particularities of Java Card and smart card aware applications from the specifier as much as possible. In the proposed approach, the specification of the aplication logic needs not be preoccupied with the specific aspects of the Java Card pl...

2004
Hoon-Jae Lee ManKi Ahn Seongan Lim Sang-Jae Moon

In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the side channel attacks for the smart card and similar security evaluation criteria for smart card protection profiles based on the common criterion. Futhermore, we proposes the smart card security evaluation criteria f...

2013
Kai Chain Wen-Chung Kuo Jiin-Chiou Cheng

Smart card based password for authentication has become a common trend. Although smart card brings conveniences, it also increases the risk in the case of lost cards. In other words, when the smart card is possessed by an attacker, the attacker will possibly attempt to analyze the secret information within the smart card to deduce the authentication mechanism of the server and then forge user c...

2003
Tommaso Cucinotta Marco Di Natale David Corcoran

This paper presents an open protocol for interoperability across multi-vendor programmable smart cards. It allows exposition of on-card storage and cryptographic services to host applications in a unified, card-independent way. Its design, inspired by the standardization of on-card Java language and cryptographic API, has been kept as generic and modular as possible. The protocol security model...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید