نتایج جستجو برای: smart card

تعداد نتایج: 95971  

Journal: :journal of health management and informatics 0
mohtaram nematollahi

introduction: nowadays different countries benefit from health system based on health cards and projects related to smart cards. lack of facilities which cover this technology is obvious in our society. this paper aims to design minimum data sets of health smart card system for iran. methods: this research was an applied descriptive study. at first, we reviewed the same projects and guidelines ...

2015

smart card abstract pdf Smart cards are used in information technologies as portable integrated.Abstract: While mobile handheld devices provide productivity benefits, they also pose. Paper describes two novel types of smart card with unconventional form factors. smart card abstract ppt Pdf.ABSTRACT Over the past few years, smart cards have achieved a growing acceptance as a powerful tool for se...

2012
Yongge Wang

We study the security requirements for remote authentication with password protected smart card. In recent years, several protocols for password-based authenticated key exchange have been proposed. These protocols are used for the protection of password based authentication between a client and a remote server. In this paper, we will focus on the password based authentication between a smart ca...

2012
Raja Naeem Akram

In this thesis we propose a design for a ubiquitous and interoperable device based on the smart card architecture to meet the challenges of privacy, trust, and security for traditional and emerging technologies like personal computers, smart phones and tablets. Such a device is referred a User Centric Tamper-Resistant Device (UCTD). To support the smart card architecture for the UCTD initiative...

2010
Raja Naeem Akram Konstantinos Markantonakis Keith Mayes

Multi-application smart card technology facilitates applications to securely share their data and functionality. The security enforcement and assurance in application sharing is provided by the smart card firewall. The firewall mechanism is well defined and studied in the Issuer Centric Smart Card Ownership Model (ICOM), in which a smart card is under total control of its issuer. However, it is...

2011
Pierre Neron Quang-Huy Nguyen

Smart card Web server provides a modern interface between smart cards and the external world. It is of paramount importance that this new software component does not jeopardize the security of the smart card. This paper presents a formal model of the smart card Web server specification and the proof of its security properties. The formalization enables a thoughtful analysis of the specification...

2009
Raja Naeem Akram Konstantinos Markantonakis Keith Mayes

The predominant smart card ownership model is the issuer centric, and it has played a vital role in the proliferation of the technology. However, recent developments of multi-application smart card technology lead to new potential ownership models. One of the possible models is the User Centric Smart Card Ownership Model. In this model, the ownership is with smart card users. To support user’s ...

Journal: :Inf. Sec. Techn. Report 2009
Konstantinos Markantonakis Michael Tunstall Gerhard P. Hancke Ioannis G. Askoxylakis Keith Mayes

Smart card technology has evolved over the last few years following notable improvements in the underlying hardware and software platforms. Advanced smart card microprocessors, along with robust smart card operating systems and platforms, contribute towards a broader acceptance of the technology. These improvements have eliminated some of the traditional smart card security concerns. However, r...

1999
Pierre GIRARD Jean-Louis LANET Pierre Girard Jean-Louis Lanet

In this paper, we aim to discuss various threats raised by Java Cards at various levels of the system. First, we address the Java Card platform security itself, from the chip security features to the Java Card virtual machine. Next, we expose how to deal with application security which is a standard problem for smart card manufacturers but a quite new one for third party Java developers beginni...

2014
Swati Nema Anamika Soni

As of today, numerous researchers have explored the issue of secure and efficient smart card based authentication scheme for these variety of application areas. This article explores the background research on the single server smart card authentication schemes as well as multi-server smart card authentication schemes and its associated research gaps. This article gives comparative analysis of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید