نتایج جستجو برای: smart health card

تعداد نتایج: 1067158  

2011
Chun-Ta Li Cheng-Chi Lee Chen-Ju Liu Chin-Wen Lee

Remote user authentication is important to identify whether communicating parties are genuine and trustworthy using the password and the smart card between a login user and a remote server. Recently, we find that Kim et al.’s password-based authentication scheme [1] assume that the attacker cannot extract the secret information of the smart card. However, in reality, the authors in [2,8] show t...

2011
Wojciech Mostowski Pim Vullers

In this paper we discuss an efficient implementation of anonymous credentials on smart cards. In general, privacy-preserving protocols are computationally intensive and require the use of advanced cryptography. Implementing such protocols for smart cards involves a trade-off between the requirements of the protocol and the capabilities of the smart card. In this context we concentrate on the im...

Journal: :Social science & medicine 2000
P Drentea P J Lavrakas

This research responds to the call for more research on the conceptualization and measurement of socio-economic status that moves beyond merely considering education, occupation and income variables. Credit card usage and credit card debt is a growing phenomenon in developed countries. Using data from a 1997 representative sample of more than 900 adults in Ohio, we explored how credit card debt...

2013
Raja Naeem Akram Konstantinos Markantonakis Keith Mayes

User Centric Smart Card Ownership Model (UCOM) gives the freedom of choice of respective applications to the smart card users. The user-centric architecture requires a trusted entity to be present on the smart card to provide security assurance and validation to the requesting application providers. In this paper, we propose the inclusion of a trusted computing platform for smart cards that we ...

2002
Simon W. Moore Robert D. Mullins Paul A. Cunningham Ross J. Anderson George S. Taylor

We demonstrate how 1-of-n encoded speed-independent circuits provide a good framework for constructing smart card functions that are resistant to side channel attacks and fault injection. A novel alarm propagation technique is also introduced. These techniques have been used to produce a prototype smart card chip: a 16-bit secure processor with Montgomery modular exponentiator and smart card UART.

2006
Dennis Vermoen

Faculty of Electrical Engineering, Mathematics and Computer Science CE-MS-2006-05 Power analysis of smart cards is commonly used to obtain information about implemented cryptographic algorithms. We propose a similar methodology for reverse engineering of Java Card applets. In order to acquire power traces, we present a new microcontroller based smart card reader with an accurate adjustable trig...

2018
Praveen Kumar Singh Neeraj Kumar Bineet Kumar Gupta

In today’s world carrying a number of plastic smart cards to establish our identity has become an integral segment of our routine lives. Identity establishment necessitates a pre stored readily available data about self and to the administrator to authenticate it with claimer’s personal information. There is a distinct requirement of a technological solution for nationwide multipurpose identity...

1999
Stefan Lucks Rüdiger Weis

Remotely keyed encryption supports fast encryption on a slow smart card. For the scheme described here, even a smart card without a builtin encryption function, would do the job, e.g., a signature card.

2011

Globally, maternal mortality remains a big public health problem. Kenya is one of the African countries with high maternal mortality with current estimates being as high as 488 deaths per 100,000 live births 1 .Although the Kenya government is making efforts to reverse maternal mortality trends, challenges related to a supportive legal environment, access to services and general rights awarenes...

2004
Stéphane Bonnet Olivier Potonniée

Smart card configuration is a complex process, which has an important impact on the product price. Realizing it efficiently and with minimum development effort is a major challenge for smart card manufacturers. This paper exposes the motivations for applying modeling techniques to Software Product Line (SPL), in order to improve the smart card configuration and personalization processes. Our ap...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید