نتایج جستجو برای: smart card

تعداد نتایج: 95971  

2004
Stéphane Bonnet Olivier Potonniée Raphaël Marvie Jean-Marc Geib

The configuration of smart cards is a complex multi-level process. Addressing this process efficiently is a major challenge of the smart card industry. In the context of the forthcoming evolutions of smart card systems, we are ex-perimenting new configuration methods. We propose to rely on both model-driven engineering and software product lines to formalize and automate the smart card configur...

2002
István Zsolt BERTA Zoltán Ádám MANN

Elliptic Curve Cryptography (ECC) is a relatively new branch of public key cryptography. Its main advantage is that it can provide the same level of security as RSA with significantly shorter keys, which is beneficial for a smart card based implementation. It is also important as a possible alternative of RSA. This paper presents the authors’ research concerning ECC and smart cards. The authors...

Journal: :Informatica (Slovenia) 2012
Ravi Singh Pippal Shashikala Tapaswi Jaidhar C. D.

In Internet Protocol Television (IPTV) broadcasting, service providers charge subscription fee by scrambling the program in Conditional Access System (CAS). This avoids unauthorized users to receive the programs. A smart card (CA card) is used to decrypt the Control Words (CWs) and transfer them back to Set-Top Box (STB) in order to descramble the scrambled program. This paper presents a secure...

1994
Pieter H. Hartel Eduard K. de Jong Frz

The operating system of a smart card is a safety critical system. Distributed in millions, smart cards with their small 8-bit CPU support applications where transferred values are only protected by the strength of a cryptographic protocol. This strength goes no further than the implementation of the software in the card and terminal allows. Because of its complexity, to guarantee absolute relia...

Journal: :IEEE Micro 2001
Jean-François Dhem Nathalie Feyt

The need to manage and secure a rapidly growing information network has focused increasing attention on smart card technology. Over the past decade, smart cards evolved from offering basic memory to complex systems with chips that incorporate powerful processing units with dedicated peripherals. This evolution enabled a wide range of applications. Smart card applications include financial trans...

2002
IM Y. JUNG SUNG I. JUN KYO I. CHUNG

EEPROM as persistent memory in smart card has some different features with other memories. It consists of the pages with a fixed size and has the characteristics due to them. It is more efficient to consider them and to handle EEPROM by page than to think of it as a seamless space and to deal with it as one large chunk. Because smart card is categorized as the device closely interactive with us...

2013

from historical banking and telecommunication applications to electronic passports, electronic IDs, anti-counterfeiting devices, smartgrid applications, and more. The security requirements for most of these applications are crucial and evolving. In addition, more and more sophisticated attacks are being developed every day. As a result, design of Smart Card ICs is a growing challenge. This pape...

Journal: :I. J. Network Security 2016
Jianghong Wei Wenfen Liu Xuexian Hu

In distributed systems, the smart card based password authentication, as one of the most convenient and efficient two-factor authentication mechanisms, is widely used to ensure that the protected services are not available to unauthorized users. Recently, Li et al. demonstrated that the smart card based password authentication scheme proposed by Chen et al. cannot provide perfect forward secrec...

Journal: :IEEE Concurrency 1999
Michael Baentsch Peter Buhler Thomas Eirich Frank Höring Marcus Oestreicher

functionality would significantly extend smart card possibilities. However, until very recently, such promises have not been backed by real implementations; JavaCard existence has been limited to reference implementations—better known as simulations. However, JavaCard implementations now exist and the technology is beginning to live up to the hype. A JavaCard is a typical smart card: it conform...

2013
Raja Naeem Akram Konstantinos Markantonakis Keith Mayes

Remote attestation mechanisms are well studied in the highend computing environments; however, the same is not true for embedded devices especially for smart cards. With ever changing landscape of smart card technology and advancements towards a true multiapplication platform, verifying the current state of the smart card is signi cant to the overall security of such proposals. The initiatives ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید