Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Smart Card"

ADD TO MY LIST
 
Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

Author(s): Daesung Moon | Yongwha Chung | Sung Bum Pan | Jin-Won Park
Design and Realization of New Generation Campus Smart Card System Based on the Mobile Communication

Author(s): Qijie Sheng | Xin Tong | Xiangyang Song | Zhihao Zhang | Jun Xu
O Registro Clínico Computadorizado

Author(s): Adilton Lobo
Secure Electronic Cards in Public Services

Author(s): Cristian TOMA | Marius POPA | Catalin BOJA | Miruna VASILACHE
MESURE Tool to benchmark Java Card platforms

Author(s): Samia Bouzefrane | Julien Cordry | Pierre Paradinas
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES

Author(s): Ehab Mahmoud Mohamed | Yasien Mahmoud | Hiroshi Furukawa
A Multimodal Biometric System Implemented within an Active Database Management System

Author(s): Kornelije Rabuzin | Miroslav Bača | Mirko Maleković
A Password-Authenticated Key Agreement Scheme Based on ECC Using Smart Cards

Author(s): Aqeel Khalique | Kuldip Singh | Sandeep Sood
Cryptanalysis on two multi-server password based authentication protocols

Author(s): Jue-Sam Chou | Chun-Hui Huang | Yalin Chen
Embedded Controller Based Smart Card Access

Author(s): Vivek Kumar Sehgal | Nitin | Durg Singh Chauhan
Comments on five smart card based password authentication protocols

Author(s): Yalin Chen | Jue-Sam Chou | Chun-Hui Huang
Cryptanalysis on four two-party authentication protocols

Author(s): Yalin Chen | Jue-Sam Chou | Chun-Hui Huang
Improved Efficient Remote User Authentication Schemes

Author(s): Xiaojian Tian | Robert W. Zhu | Duncan S. Wong
Novel Secure Communication Protocol for Conditional Access System

Author(s): Liu Yongliang | Xiaolin Yang | Hongxun Yao | Wen Gao
Cryptanalysis of a User Friendly Remote Authentication Scheme with Smart Card

Author(s): Min-Shiang Hwang | Jung-Wen Lo | Chi-Yu Liu | Shu-Chen Lin
Improvement of Fixing Problems in Lin et al.`s OSPA Protocol

Author(s): Jau-Ji Shen | Ching-Ying Lin | Hung-Wen Yang
An Improved Biometric Remote User Authentication Scheme Based on Nonce

Author(s): Keerti Srivastava, Amit K Awasthi, R.C.Mittal
Lossy Image Compression For Multi Application Smart Card

Author(s): L.M. Palanivelu | Dr. P. Vijayakumar
MDA Based Framework for the Development of Smart Card Based Application

Author(s): Alireza Nikseresht | Koorush Ziarati
Efficient Small Template Iris Recognition System Using Wavelet Transform

Author(s): Mohammed A. M. Abdullah, F. H. A. Al-Dulaimi, Waleed Al-Nuaimy, Ali Al-Ataby
The GENIUS Grid Portal and robot certificates: a new tool for e-Science

Author(s): Barbera Roberto | Donvito Giacinto | Falzone Alberto | La Rocca Giuseppe | Milanesi Luciano | Maggi Giorgio | Vicario Saverio
Player Profile Management on NFC Smart Card for Multiplayer Ubiquitous Games

Author(s): Romain Pellerin | Chen Yan | Julien Cordry | Eric Gressier-Soudan
A Novel Luby-Rackoff Based Cipher in a NewFeistel-Network Based LPRKES for Smart Cards

Author(s): Ehab Mahmoud Mohamed | Hiroshi Furukawa | Yasien Mahmoud
Fraudulent Internet Banking Payments Prevention using Dynamic Key

Author(s): Osama Dandash | Yiling Wang | Phu Dung Leand | Bala Srinivasan
Guest Editorial

Author(s): Mohammad S. Obaidat | Joaquim Filipe
Construction of a Shared Terminal System by LDAP-Smart Card Authentication Cooperation

Author(s): Kazuto Kuzuu | Yasushi Hirano | Kenji Mase | Toyohide Watanabe
An Improvement of Liou et al.’s Authentication Scheme using Smart Cards

Author(s): Sandeep K. Sood | Anil K. Sarje | Kuldip Singh
Face Recognition System

Author(s): N.V.S.L.SWARUPA | D.SUPRIYA
Performance Issues of Health Care System using SQL server

Author(s): Narendra Kohli | Nishchal K. Verma
Iris Recognition: The Consequences of Image Compression

Author(s): Robert W. Ives | Daniel A. Bishop | Yingzi Du | Craig Belcher
Active Trial-and-error Attack on SASC Protocols

Author(s): Heeyoul Kim | Younho Lee | Seong-Min Hong | Hyunsoo Yoon
Unique Identification System

Author(s): Alankrit Patnaik | Deepak Gupta
Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-Server Environment

Author(s): Rafael Martínez-Peláez | Francisco Rico-Novella | Cristina Satizábal | Jacek Pomykała
An approach to a pseudo real-time image processing engine for hyperspectral imaging

Author(s): Sahar Sabbaghi Mahmouei | Dr. Shattri Mansor | Abed Abedniya
A Dynamic Trust-Based Context-Aware Authentication Framework with Privacy Preserving

Author(s): Abdallah MHAMED, Pierre E. ABI-CHAR, Bachar EL-HASSAN Mounir MOKHTARI
A Secure Dynamic Authentication Scheme for Smart Card based Networks

Author(s): Dr. S. Santhosh Baboo | K. Gokulraj
Using RFID to Enhance Mobile Banking Security

Author(s): Zakaria Saleh | Izzat Alsmadi
A REMOTE LOGIN AUTHENTICATION SCHEME WITH SMART CARDS BASED ON UNIT SPHERE

Author(s): MANOJ KUMAR | M. K. GUPTA | SARU KUMARI
A Novel Stegnosystem Design for Defying Differential Power Analysis Attacks on Smart Cards

Author(s): Hanan Mahmoud | Khaled Alghathbar | Alaaeldin Hafez
Health Care Implementation by Means of Smart Cards

Author(s): Magdy E. Elhennawy | Mohamed Amer | Ashraf Abd El-Hafeez
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks

Author(s): Pardeep Kumar | Amlan Jyoti Choudhury | Mangal Sain | Sang-Gon Lee | Hoon-Jae Lee
Ebanking for comprehensive EDemocracy: An Indian Discernment

Author(s): Nikhil Agarwal | Ruchi Agarwal | Prasoon Sharma | A.M Sherry
A Tamper-Resistant and Portable Healthcare Folder

Author(s): Nicolas Anciaux | Morgane Berthelot | Laurent Braconnier | Luc Bouganim | Martine De la Blache | Georges Gardarin | Philippe Kesmarszky | Sophie Lartigue | Jean-François Navarre | Philippe Pucheral | Jean-Jacques Vandewalle | Karine Zeitouni
Smart Card Security; Technology and Adoption

Author(s): Hamed Taherdoost | Shamsul Sahibuddin | Neda Jalaliyoon
Rule-based Test Generation with Mind Maps

Author(s): Dimitry Polivaev
Data Compression of Fingerprint Minutiae

Author(s): VISHAL SHRIVASTAVA | SUMIT SHARMA
IMPLEMENTATION OF THE TRIPLE-DES BLOCK CIPHER USING VHDL

Author(s): Sai Praveen Venigalla | M. Nagesh Babu | Srinivas Boddu | G. Santhi Swaroop Vemana
Iris Recognition: The Consequences of Image Compression

Author(s): Ives RobertW | Bishop DanielA | Du Yingzi | Belcher Craig
Design of Data Cubes and Mining for Online Banking System

Author(s): Dr.Harsh Dev | Suman Kumar Mishra
Design and Implementation of an Electronic Identification Card

Author(s): J. Flores‐Escalante | J. Pérez‐Díaz | R. Gómez‐Cárdenas
CREDIT CARD FRAUD

Author(s): Lăcrămioara BALAN | Mihai POPESCU
Cryptanalysis of An Advanced Authentication Scheme

Author(s): Sattar J Aboud | Abid T. Al Ajeeli
Deploying a Web Client Authentication System Using Smart Card for E-Systems

Author(s): Shadi Aljawarneh | Maher debabneh | Shadi Masadeh | Abdullah Alhaj
A Scheme for Integrated Multibanking Solution

Author(s): Sree Rekha G | V.K.Agrawal
A New Proxy Blind Signature Scheme based on ECDLP

Author(s): Daniyal M Alghazzawi | Trigui Mohamed Salim | Syed Hamid Hasan
Pension Systems in Europe. Case of Germany

Author(s): Jarosław Poteraj
A Prepaid Smart Metering Scheme Based on WiMAX Prepaid Accounting Model

Author(s): Reduan H. Khan | Tanzim F. Aditi | Victor Sreeram | Herbert H. C. Iu
Improving Enterprise Access Security Using RFID

Author(s): zakaria Saleh | Izzat Alsmadi | Ahmed Mashhour
Why do you need a reservation system?      Save time & money - Smart Internet Solutions