Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   14  
      Information TechnologyTechnologyPublic sectorBiological Sciences
    • by 
    •   6  
      RFIDSecurity AnalysisCost effectivenessSmartcard
    • by 
    •   9  
      ModelingCryptographySafetyCryptanalysis
    • by 
    • Smartcard
The purpose of this paper is to highlight and solve issues concerning the biometric information for authentication and their use with smartcards
    • by 
    •   2  
      SmartcardBiometric Authentication
    • by 
    •   2  
      SmartcardJavacard
    • by 
    •   3  
      Mobile phoneSmart CardSmartcard
    • by 
    •   3  
      SmartcardBody of KnowledgeSecurity Evaluation
    • by 
    •   2  
      E-GovernmentSmartcard
    • by 
    •   13  
      Public Key InfrastructureSecurity ManagementComputer SoftwarePKI
    • by 
    •   8  
      Radio Frequency IdentificationRadio FrequencyBit Error RateSmartcard
    • by 
    •   6  
      CryptographyElectronic Health RecordSmartcardAuthorization
We present a unified framework for advanced implementation attacks that allows for conducting automated side-channel analysis and fault injection targeting all kinds of embedded cryptographic devices including RFIDs. Our proposed low-cost... more
    • by 
    •   5  
      Side-channel attackSmartcardEmbedded ComputingData Acquisition System
Land is the habitat of man and its wide use is crucial for the economic, social, and environmental advancement of the country. Maintaining this vast land records data consisting of cadastral maps and alphanumeric data containing record of... more
    • by 
    •   12  
      GeographyLand managementRural DevelopmentData Warehousing
    • by 
    • Smartcard
The performance of a distributed system is affected by the various functions of its components. The interaction between components such as network nodes, computer systems and system programs is examined with special interest accorded to... more
    • by 
    •   87  
      EngineeringTechnologyArchitectureGovernment
    • by 
    •   4  
      EngineeringMathematical SciencesDigital SystemsSmartcard
Abstract— Electronic Commerce (e-Commerce) and ease in the onsite transactions have led to the exponential growth in the acceptance of credit cards among consumers of all the sections. But despite their remarkable advantages, consumers... more
    • by 
    •   9  
      Mobile DeviceSmartcardCredit CardsExponential Growth
    • by  and +1
    •   5  
      Electronic VotingCommunication ChannelsSmartcardBoolean Satisfiability
    • by  and +1
    •   6  
      Tate pairingWhite PaperEmbedded processorSmartcard
A novel protocol is proposed to address the problem of user authentication to smartcards using devices that are currently inexpen- sive. The protocol emulates expensive Match On Card (MOC) smart- cards, which can compute a biometric... more
    • by 
    •   4  
      Formal VerificationSmart CardSmartcardUser authentication
    • by  and +2
    • Smartcard
    • by 
    •   11  
      Land managementRural DevelopmentData WarehousingOpen Source
    • by  and +1
    •   9  
      Mobile DeviceSmartcardCredit CardsExponential Growth
    • by 
    •   3  
      Library and Information StudiesResearch Excellence FrameworkSmartcard
    • by 
    •   7  
      Ubiquitous ComputingPayment SystemMobile PaymentSmartcard
    • by 
    •   3  
      MiddlewareComputer NetworkSmartcard
A contactless smartcard is a smartcard that can communicate with other devices without any physical connection, using Radio-Frequency Identifier (RFID) technology. Contactless smartcards are becoming in-creasingly popular, with... more
    • by 
    •   6  
      Radio FrequencySmart CardSystem SecuritySmartcard
    • by  and +1
    •   11  
      EngineeringInformation TechnologyPublic TransportIntelligent Transport System
Abstract. ISO 14443 compliant smartcards are widely-used in privacy and security sensitive applications. Due to the contactless interface, they can be activated and read out from a distance. Thus, relay and other at-tacks are feasible,... more
    • by 
    •   6  
      RFIDSecurity AnalysisCost effectivenessSmartcard
    • by 
    •   14  
      Distributed ComputingAccess ControlJava CardWireless Network
Sebenarnya smartcard bukan barang baru. Industri smartcard dimulai ketika Bull (perusahaan komputer dari Perancis) dan Motorola (perusahaan chip dari Amerika Serikat) merancang dan mengembangkan smartcard untuk pertama kalinya pada tahun... more
    • by 
    • Smartcard
    • by 
    •   7  
      Participatory DesignSocial ExclusionLocal governanceFlash memory
    • by 
    •   6  
      Digital SignatureMagnetic fieldRadio Frequency IdentificationSmartcard
    • by 
    •   16  
      EngineeringTechnologyPrivacyComputer Networks
    • by 
    •   6  
      Key ManagementSmartcardContent DeliveryElectrical And Electronic Engineering
    • by 
    •   7  
      Participatory DesignSocial ExclusionLocal governanceFlash memory
We present new attacks against the EMV financial transaction security system (known in Europe as "Chip and PIN"), specifically on the back-end API support for sending secure mes- sages to EMV smartcards. We examine how secure... more
    • by 
    •   2  
      Security in routing protocolsSmartcard
    • by 
    •   15  
      Computer SecurityCryptographyDesign processSmart Cards
A new Italian law regarding the recruitment of university researchers and teaching staff provides for election on a national basis of the members of the selection committees. In order to handle such a process, an electronic voting system... more
    • by 
    •   3  
      CryptographySmartcardItalian universities
    • by  and +1
    •   20  
      Distributed ComputingBiometricsConfidenceComputer Security
    • by 
    •   6  
      BiometricsJava CardSmartcardPerforation
    • by 
    •   2  
      SmartcardUser authentication
    • by 
    •   13  
      Web ServicesCryptographyContent ManagementAuthentication
    • by 
    •   5  
      Zero-Knowledge ProofsSmart CardSmartcardSecure Computation
    • by 
    •   5  
      Software SecurityUbiquitous ComputingData AccessSmartcard
    • by 
    •   6  
      Health ProfessionalsHealth SystemSmartcardClinical Data
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES and DES. Various methods of faults attack on cryptographic systems have been discovered and researched. However, to the... more
    • by 
    •   15  
      LogicCryptographySampling methodsSmart Cards
    • by 
    •   2  
      Mobile Ad Hoc NetworkSmartcard
Information integration is one of the most important aspects of a Data Warehouse. When data passes from the sources of the application-oriented operational environment to the Data Warehouse, possible inconsistencies and redundancies... more
    • by 
    •   7  
      Information SystemsDistributed ComputingData WarehousingCommunication System