Abstract- Now a day’s smart card based application are prevalent. strong cryptographic algorithm are needed to protect the data stored on the card. Smart card with embedded microcontroller has exceptional property to securely store the data and to perform the on-card functions like encryption and digital signature. In many applications it is important to share information without exposing private details. In this paper we will find ways to protect data while also allowing it to be compared with other party
This article presents an overview of the cryptographic primitives that are commonly implemented on s...
Smart cards are being toted as the secure means of payment for the future. But there are still some ...
The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification) smar...
In the smart card industry, the application acquisition process involves the card issuers and applic...
Abstract Regarding the official authentication method which is a strong encrypt method for financial...
ABSTRACT Internet of Things is a most promising domain where the confidentiality and integrity of d...
In traditional symmetric authentication schemes for smart card, the smart card sends its card number...
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for i...
Unambiguous identification is essential to any form of transaction in e-commerce. However, credit ca...
The design of very small databases for smart cards and for portable embedded systems is deeply const...
Smart cards have proven to be quite useful as a contract sanction records medium in European countri...
User Centric Ownership Model (UCOM) enables the smart card users to install/delete application they ...
This master thesis developed and tested the idea that smart cards are able to help mitigate security...
This paper initiates the study of two specific security threats on smart-card-based password authent...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
This article presents an overview of the cryptographic primitives that are commonly implemented on s...
Smart cards are being toted as the secure means of payment for the future. But there are still some ...
The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification) smar...
In the smart card industry, the application acquisition process involves the card issuers and applic...
Abstract Regarding the official authentication method which is a strong encrypt method for financial...
ABSTRACT Internet of Things is a most promising domain where the confidentiality and integrity of d...
In traditional symmetric authentication schemes for smart card, the smart card sends its card number...
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for i...
Unambiguous identification is essential to any form of transaction in e-commerce. However, credit ca...
The design of very small databases for smart cards and for portable embedded systems is deeply const...
Smart cards have proven to be quite useful as a contract sanction records medium in European countri...
User Centric Ownership Model (UCOM) enables the smart card users to install/delete application they ...
This master thesis developed and tested the idea that smart cards are able to help mitigate security...
This paper initiates the study of two specific security threats on smart-card-based password authent...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
This article presents an overview of the cryptographic primitives that are commonly implemented on s...
Smart cards are being toted as the secure means of payment for the future. But there are still some ...
The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification) smar...