Academic literature on the topic 'Smartcard'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Smartcard.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Smartcard"

1

Kristanti, Ayu Dian, and Didik Setiyadi. "Sistem Pembayaran Otomatis Berbasis Contactless Smartcard dengan Teknologi RFID di Kantin SMK Taman Harapan Bekasi." Journal of Students‘ Research in Computer Science 2, no. 2 (November 30, 2021): 177–88. http://dx.doi.org/10.31599/jsrcs.v2i2.915.

Full text
Abstract:
During a pandemic, we must reduce physical contact both with other people and with objects around us. With automatic payments using RFID technology based on the Internet of Things and websites to minimize physical contact (contactless smartcards) and minimize fraud in transactions. The system uses RFID sensors, Nodemcu esp8266, Jumper cables, I2c LCDs, and databases. Using the Prototype method that works continuously through collaboration between users and analysts. The contactless smartcard system at the SMK Taman Harapan Bekasi canteen can make transactions easier in the canteen. The contactless smartcard was created using the NodeMCU Esp8266 by utilizing the rfid mifare522 sensor as a tag detector so that it can facilitate the buying and selling process, for monitoring it has used a website with data that has been automatically stored in the database to find out canteen and admin user information and transaction history is saved to the database in real time. Keywords: Database, Intenet of Things, Nodemcu esp8266, RFID, Web Service. Abstrak Pada masa pandemi kita harus mengurangi kontak fisik baik dengan orang lain maupun dengan benda disekitar. Dengan pembayaran otomatis menggunakan teknologi RFID berbasis Internet of Things dan website untuk meminimalisir kontak fisik (contactless smartcard) dan meminimalisir kecurangan dalam bertransaksi. Sistem menggunakan Sensor RFID, Nodemcu esp8266, kabel Jumper, Lcd I2c, dan database. Menggunakan metode Prototype yang bekerja yang secara terus menerus melalui kerjasama antara user dan analis. Dengan Sistem contactless smartcard di Kantin SMK Taman Harapan Bekasi dapat mempermudah transaksi di kantin. Contactless smartcard dibuat menggunakan NodeMCU Esp8266 dengan memanfaatkan rfid mifare522 sensor sebagai pendeteksi tag sehingga dapat memudahkan proses jual beli, untuk monitoringnya sudah menggunakan website dengan data yang sudah otomatis tersimpan dalam database untuk mengetahui informasi user kantin dan admin serta history transaksi disimpan ke database secara realtime. Kata kunci: Database, Intenet of Things, Nodemcu esp8266, RFID, Web Service.
APA, Harvard, Vancouver, ISO, and other styles
2

Cherrill, D., and A. Brocklehurst. "Smartcard certfication." Information Security Technical Report 4, no. 2 (January 1999): 42–50. http://dx.doi.org/10.1016/s0167-4048(99)80013-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cherrill, David. "Smartcard certification." Information Security Technical Report 4 (January 1999): 5–6. http://dx.doi.org/10.1016/s1363-4127(99)80021-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ayer, Ken. "Mitigating smartcard risks." Information Security Technical Report 4 (January 1999): 6–7. http://dx.doi.org/10.1016/s1363-4127(99)80023-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Burns, Susan, and George R. S. Weir. "Varieties of smartcard fraud." International Journal of Electronic Security and Digital Forensics 1, no. 4 (2008): 374. http://dx.doi.org/10.1504/ijesdf.2008.021455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alyanakian, Edmond. "The Smartcard in Norway." Retail and Distribution Management 16, no. 2 (February 1988): 25–28. http://dx.doi.org/10.1108/eb018370.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sun, Shichao, and Dongyuan Yang. "Identifying Public Transit Commuters Based on Both the Smartcard Data and Survey Data: A Case Study in Xiamen, China." Journal of Advanced Transportation 2018 (November 1, 2018): 1–10. http://dx.doi.org/10.1155/2018/9693272.

Full text
Abstract:
Understanding the travel patterns of public transit commuters was important to the efforts towards improving the service quality, promoting public transit use, and better planning the public transit system. Smartcard data, with its wide coverage and relative abundance, could provide new opportunities to study public transit riders’ behaviors and travel patterns with much less cost than conventional data source. However, the major limitation of smartcard data is the absence of social attributes of the cardholders, so that it cannot clearly extract public transit commuters and explain the mechanism of their travel behaviors. This study employed a machine learning approach called Naive Bayesian Classifier (NBC) to identify public transit commuters based on both the smartcard data and survey data, demonstrated in Xiamen, China. Compared with existing methods which were plagued by the validation of the accuracy of the identification results, the adopted approach was a machine learning algorithm with functions of accuracy checking. The classifier was trained and tested by survey data obtained from 532 valid questionnaires. The accuracy rate for identification of public transit commuters was 92% in the test instances. Then, under a low calculation load, it identified the objectives in smartcard data without requiring travel regularity assumptions of public transit commuters. Nearly 290,000 cardholders were classified as public transit commuters. Statistics such as average first boarding time and travel frequency of workdays during peak hours were obtained. Finally, the smartcard data were fused with bus location data to reveal the spatial distributions of the home and work locations of these public transit commuters, which could be utilized to improve public transit planning and operations.
APA, Harvard, Vancouver, ISO, and other styles
8

Thani, Fakhriyah Abdullah, and Muhammad Anshari. "Maximizing Smartcard for Public Usage." International Journal of Asian Business and Information Management 11, no. 2 (April 2020): 121–32. http://dx.doi.org/10.4018/ijabim.2020040108.

Full text
Abstract:
With the rise of smart cards, it has utilized so that multiple applications can be built into the technology. This research aims to offer a multipurpose smart card as a solution for the duplicate smart card system. Using a mixed methods approach, one hundred samples were collected from the public. The data was analyzed using descriptive statistics. A Plan-Do-Check-Act (PDCA) assessment and a Root Cause Analysis (RCA) were used to analyze the collected data. The results indicated that the public views the current smart card system serves only a limited function and are open to the idea of a multipurpose smart card system. Recommendations are given to raise the awareness of the current smart card problem and to provide insight to better serve the public.
APA, Harvard, Vancouver, ISO, and other styles
9

Gengler, Barbara. "US Army Chooses Smartcard Technology." Network Security 2002, no. 1 (January 2002): 5–6. http://dx.doi.org/10.1016/s1353-4858(02)00114-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

., Abu Abraham Mathews. "TRAIN TICKETING SYSTEM USING SMARTCARD." International Journal of Research in Engineering and Technology 03, no. 15 (May 25, 2014): 133–38. http://dx.doi.org/10.15623/ijret.2014.0315024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Smartcard"

1

Vu, Hung V. "Healthcare Optimizing Patient Education Smartcard (H.O.P.E.S.)." Thesis, California State University, Long Beach, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10752237.

Full text
Abstract:

The healthcare industry is ever-changing, with the significant advancement of technology compare to 30 years ago. Access to information has become quicker and paper chart has been reduced to the implementation and the creation of an EMR/EHR system. With patients obtaining a healthcare smartcard and acts as a portable EHR, this can help clinicians communicate better with other clinicians and be able to educate their patients on drug therapies, avoid administering duplicate testing, and thus, reduce cost for both the insurance and patients side. H.O.P.E.S. is making its way in the healthcare industry to alleviate burden for patients carrying papers and lab results, when it can be store using the smartcard system. This allows clinicians to access patients’ latest results if patients are seeing multiple clinicians (specialists) for their medical conditions. The smartcard allows physicians to educate their patients, getting them more involve and advocate for a healthier lifestyle.

APA, Harvard, Vancouver, ISO, and other styles
2

Henderson, Neil James. "Polymer thick film sensors for embedded smartcard biometrics and identity verification." Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268936.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Leahy, Christopher John. "Understanding the Mean-Variance framework through the application of Public Transport Smartcard data." Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/18706/.

Full text
Abstract:
Reliability is an important aspect of any transportation system, and there has been a substantial amount of research to bring it to the point where it can be accurately incorporated into established forecasting and appraisal frameworks. At the same time, emerging data sources, such as public transport smartcards, provide opportunities to understand more about the reliability of a particular transport system. This thesis conducts research on reliability using smartcard data. In the first instance the thesis provides a critique of the Mean-Variance framework for the treatment of transport reliability and finds room for adaptation. The thesis also provides a review of empirical research that estimates Mean-Variance variables and parameters, and finds evidence of methodological issues. In response to these issues, the thesis utilises smartcard data to investigate Mean-Variance in three ways. The key element is the development of an alternative method of estimating a value of reliability, treating smartcard data as a Revealed Preference data source and combining it with established discrete choice methods. The second element uses the smartcard data to identify the factors affecting reliability levels through estimation of a linear regression model. The third strand of investigation employs the data to understand more about possible alternative measures of reliability and compares the underlying utility function of Mean-Variance with a second reliability framework. The thesis therefore demonstrates that the application of public transport smartcard data has the potential to yield insights in the field of transport reliability. In particular, it establishes how this data source might be used to estimate the value of reliability. With development, it may have the potential to forecast future reliability levels. Application of the data also supports the status quo of utilising the standard deviation as an indicator of reliability.
APA, Harvard, Vancouver, ISO, and other styles
4

Kleist, Anders. "Theory of super power saving circuits and configurations for mixed signal CPU for smartcard application." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2326.

Full text
Abstract:

Designing an application specific integrated circuit (ASIC) must be starting with careful preparations, otherwise the chip will not be as good as possible. The theoretical studies must cover everything from the chip circuits to the application structure. In mobile applications there is extremely important that the current consumption becomes minimized because the battery power is limited. The power reductions studies must include the most power costing circuits on the chip. When the whole circuit or segments of the circuit is not in use, they must switch fast and simple into another mode that consume nearly none power. This mode is called sleep-mode. If the sleep-mode has very low leakage currents, the lifetime of the application will dramatically increase.

This report studies the most power costing circuits in smartcard application ASIC. The chip should be used to control a LCD display on the smartcard. The circuits that have been investigated are level shifters, charge pumps and LCD drivers, also sleep-mode configuration possibilities have been investigated. Other small preparing work is also included in the thesis.

APA, Harvard, Vancouver, ISO, and other styles
5

Jilkén, Oskar. "Säkerhet och integritet i närfältskommunikation." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5010.

Full text
Abstract:
Context. In today’s society we use smart cards in many areas, NFC is a smart card technology that allows contactless interaction between a reader and the tag, the tag is often in the form of a card. NFC can be used for various payment methods or as access card to a building which makes life easier. In previous studies, the technique has proven to be weak to attacks using an NFC reader connected to a computer. Among today’s smartphones, there are phones that have built-in read and write support for NFC tags. Objectives. In this study, I examine the NFC tags that are frequently used in our society, entry cards and debit cards to determine the security against the increasing use of smartphones as a potential attack tool. If there is a threat I will try to remedy the found lack. Methods. My approach was to select a number of test items and analyze the objects using only a smartphone with NFC support to determine the risk for each of the items. The test conducted was the modification, cloning and unique copy. Results. Through this investigation, I concluded that four of the non-empty items was at risk of being intimidated. All four are used in public transport and the objects were vulnerable to unique copy. Conclusions. In order to remedy this vulnerability should be the management of the tag’s data is handled in a different way, perhaps by storing the data in a internal system or to replace the tags for a safer tag alternative.
I dagens samhälle används smartcards i många områden, NFC som är en smartcard teknik som tillåter kontaktlös interaktion mellan en läsare och taggen, taggen är ofta i form av ett kort. NFC kan användas till olika betalnings metoder eller som inpasseringskort vilket gör vardagen enklare. I tidigare studier har tekniken visat sig svag för attacker med hjälp av en NFC-läsare kopplad till en dator. Bland dagens smartphones finns det telefoner som har inbyggt läs- och skriv-stöd till NFC taggar. I den här studien ska jag undersöka de NFC taggar som används flitigast i vårt samhälle, inpasseringskort och betalkort för att fastställa säkerheten mot den ökade användningen av smartphones som ett potentiellt attackverktyg, om det finns en hotbild ska jag försöka avhjälpa den funna bristen. Mitt tillväga gångsätt var att välja ut ett antal testobjekt och analysera de objekten med hjälp av endast en smartphone med NFC-stöd som verktyg. För att fastställa risken för vart och ett av objekten, de test som utfördes var modifiering, kloning och unik kopiering. Genom denna undersökning kom jag fram till att fyra av de icke tomma objekten löper risk att bli utsatta för hot alla fyra används i kollektivtrafiken och objekten var sårbara för unik kopiering, för att avhjälpa denna sårbarhet bör hanteringen av taggens data hanteras på ett annat vis, kanske genom att lagra data i ett inre system eller att byta ut taggarna till ett säkrare alternativ.
APA, Harvard, Vancouver, ISO, and other styles
6

Yamori, Nobuyoshi, and Narunto Nishigaki. "Recent Developments of Digital Cash Projects in Japan." 名古屋大学大学院経済学研究科附属国際経済政策研究センター, 2005. http://hdl.handle.net/2237/11922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kirk, Dean Frederick. "Development of a Small Envelope Precision Milling Machine." Thesis, University of Canterbury. Mechanical Engineering, 2006. http://hdl.handle.net/10092/2773.

Full text
Abstract:
The credit card industry is huge with over two and a half billion cards shipped annually. A local card manufacturer, with a production volume in excess of forty million cards annually, approached the University of Canterbury to design and develop advanced card manufacturing technology. The motivation behind this development was the desire of the sponsoring company to keep abreast of new technologies and to have the ability to manufacture and supply cards with this new and emerging technology into a highly competitive world market. This thesis reports the research surrounding the development of a dedicated new machine tool explicitly designed to implement the emerging technologies found in the international credit card industry. The machine tool, a dedicated milling machine, was not developed in its entirety within these pages; however, three major constituents of the machine were researched and developed to a point where they could be implemented or become the subject of further research. The three areas of interest were; • A machine table system that avoided the increased zonal wear to which linear bearings are subject, typically due to short high frequency traversals, and also the high friction and mass generally found in dovetail slides. • Design requirements demanded the use of a single commercially available carbide cutter to produce 1500 components per hour. Therefore, a purpose built high (revs per minute) rpm spindle and drive system specifically for use with polymeric materials, (R-PVC in particular) was deemed necessary. • Tracking the cutter depth in relation to an RFID aerial track embedded within the credit card core. The aerial tracking was to be dynamic and occur during the machining process with the machine “remembering” the depth of cut at contact with the aerial. Each of the three areas was researched via an in-depth literature review to determine what and if any material had been published in these fields. For the development of the machine table a novel flexure hinge idea was considered. Considerable material was discovered about flexures, but very little was found to be relevant to the application of high displacement metal flexures necessary to meet the required levels of table movement. In effect the proposed machine table system and research in this field would be novel. The high performance spindle investigation became directed into a much narrower focus as it progressed; that of determining the power consumption required to machine the integrated circuit pockets in an R-PVC work piece. This was due to the lack of information pertaining to the physical properties of polymeric materials, in particular the specific cutting pressure. The depth following sensor array was configured using capacitance detection methods to determine the distance between the cutter?s end and the aerial tracks. Capacitance sensing methods, whilst not new, were developed into a novel arrangement to meet the specific cutter tracking requirements of the proposed new machine tool. Each of the respective development areas had concept designs completed and were prototyped before being tested to determine the effectiveness of the respective designs. The outcomes from the testing are reported herein, and show each constituent part to be basically feasible, in the application. The results were sufficient to indicate that each development showed distinct potential but further development and integration into the machine tool should ensue.
APA, Harvard, Vancouver, ISO, and other styles
8

Jensen, Jonas. "Säkerhetsutvärdering certifikatserver i stället för aktiva kort." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2844.

Full text
Abstract:

Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card.

I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware. The method uses a server that stores all cryptographic keys for the user centrally to achieve stronger security. This report is based on a previous report which tested to implement this solution, in this report I will question the security of this system. I will then give an architecture proposal where this method is used to authenticate and allow cryptographic recourses for the user.

The conclusions you can get from this report is that the possibilities with comparable ease increase the security without investing in new hardware. But the solution will not be comparable by a ``smart card solution''in security levels. That means that the method described in this thesis is suitable for organizations that either do not need that strong security as smart card give or want a good solution without being forced to use some external hardware.

APA, Harvard, Vancouver, ISO, and other styles
9

Tiran, Sébastien. "Side Channels in the Frequency Domain." Thesis, Montpellier 2, 2013. http://www.theses.fr/2013MON20164/document.

Full text
Abstract:
De nos jours, l'emploi de la cryptographie est largement répandu et les circuits intègrent des primitives cryptographiques pour répondre à des besoins d'identification, de confidentialité, ... dans de nombreux domaines comme la communication, la PayTV, ...La sécurisation de ces circuits est donc un enjeu majeur. Les attaques par canaux cachés consistent à espionner ces circuits par différents biais comme le temps de calcul, la consommation en courant ou les émanations électromagnétiques pour obtenir des informations sur les calculs effectués et retrouver des secrets comme les clefs de chiffrement. Ces attaques ont l'avantage d'être indétectables, peu couteuses et ont fait l'objet des nombreuses études. Dans le cadre des attaques par analyse de la consommation en courant ou des émanations électromagnétiques l'acquisition de bonnes courbes est un point crucial. Malgré la forte utilisation de techniques de prétraitement dans la littérature, personne n'a tenté d'établir un modèle de fuite dans le domaine fréquentiel. Les travaux effectués durant cette thèse se concentrent donc sur cet aspect avec pour intérêt d'améliorer l'efficacité des attaques. De plus, de nouvelles attaques dans le domaine fréquentiel sont proposées, sujet peu étudié malgré l'intérêt de pouvoir exploiter plus efficacement la fuite éparpillée dans le temps
Nowadays, the use of cryptography is widely spread, and a lot of devices provide cryptographic functions to satisfy needs such as identification, confidentiality, ... in several fields like communication, PayTV, ...Security of these devices is thus a major issue.Side Channel Attacks consist in spying a circuit through different means like the computation time, power consumption or electromagnetic emissions to get information on the performed calculus and discover secrets such as the cipher keys.These attacks have the advantage to be cheap and undetectable, and have been studied a lot.In the context of attacks analysing the power consumption or the electromagnetic emissions, the acquisition of good traces is a crucial point.Despite the high use of preprocessing techniques in the literature, nobody has attempted to model the leakage in the frequency domain.The works performed during this thesis are focusing on this topic with the motivation of improving the efficiency of attacks.What's more, new frequency domain attacks are proposed, subject poorly studied despite the advantage of better exploiting the leakage spread in time
APA, Harvard, Vancouver, ISO, and other styles
10

Kilian-Kehr, Roger. "Mobile security with smartcards." Phd thesis, [S.l.] : [s.n.], 2002. http://elib.tu-darmstadt.de/diss/000214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Smartcard"

1

Publishing, Kagan. Kagan SmartCard teacher toolbox. San Clemente, Calif.]: Kagan Publishing, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Enterprise, Inc Acumen Building. Smartcard interoperability issues for the transit industry. Washington, D.C: Transportation Research Board, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Elliott, S. Smartcard technology: The commercial applications and strategic implications. Oxford: Oxford Brookes University, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

R, Johnson John. SmartCAM tutorials. Upper Saddle River, N.J: Prentice Hall, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shark Quest (Smartcard). Meadowside Children's Books, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bug Safari (Smartcard). Hyperion Books, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Space Mission (Smartcard). Meadowside Children's Books, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dinosaur Discovery (Smartcard). Meadowside Children's Books, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Inc, Sun Microsystems. Solaris Smartcard Administration Guide. Iuniverse Inc, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sun Microsystems Inc. Solaris Smartcard Administration Guide. Iuniverse Inc, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Smartcard"

1

Langer, Josef, and Michael Roland. "Smartcard Technologie." In Anwendungen und Technik von Near Field Communication (NFC), 33–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-05497-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pöhls, Henrich C., and Joachim Posegga. "Smartcard Firewalls Revisited." In Smart Card Research and Advanced Applications, 179–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11733447_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kuhn, Markus. "Smartcard Tamper Resistance." In Encyclopedia of Cryptography and Security, 1225–27. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

El Kalam, Anas Abou, Yves Deswarte, Gilles Trouessin, and Emmanuel Cordonnier. "Smartcard-Based Anonymization." In IFIP International Federation for Information Processing, 49–66. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8147-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kehr, Roger, Michael Rohs, and Harald Vogt. "Issues in Smartcard Middleware." In Lecture Notes in Computer Science, 90–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45165-x_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Burns, Susan, and George R. S. Weir. "Trends in Smartcard Fraud." In Communications in Computer and Information Science, 40–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-69403-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bella, Giampaolo. "Verifying a Smartcard Protocol." In Formal Correctness of Security Protocols, 165–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-68136-6_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schaffer, Holger. "Praxisbeispiel: Junghans-SmartCard-Uhren." In E-Commerce und E-Payment, 329. Wiesbaden: Gabler Verlag, 2001. http://dx.doi.org/10.1007/978-3-322-86953-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Martinelli, Fabio. "Biometrics to Enhance Smartcard Security." In Security Protocols, 333–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barthe, Gilles, and Guillaume Dufay. "Formal Methods for Smartcard Security." In Foundations of Security Analysis and Design III, 133–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11554578_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Smartcard"

1

Farissi, Ilhame El, Mostafa Azizi, and Mimoun Moussaoui. "Classification of smartcard attacks." In 2011 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2011. http://dx.doi.org/10.1109/icmcs.2011.5945583.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lathia, Neal, and Licia Capra. "How smart is your smartcard?" In the 13th international conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2030112.2030152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pleunis, John, and Michal Stala. "Multi-application smartcard user interface." In the 2nd European Union symposium. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1031419.1031426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bamforth, R. "Java - from smartcard to supercomputer." In IEE Colloquium on Issues for Networked Interpersonal Communicators. IEE, 1997. http://dx.doi.org/10.1049/ic:19970766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mucini, Luciano. "Manual de procedimentos SMARTCARD: módulo cliente." In Simpósio de Profissionais da UNICAMP. Universidade Estadual de Campinas, 2019. http://dx.doi.org/10.20396/sinteses.v0i7.10277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Khan, M. Fahim Ferdous, and Ken Sakamura. "Towards securer and smarter smartcard applications." In 2013 IEEE Third International Conference on Consumer Electronics ¿ Berlin (ICCE-Berlin). IEEE, 2013. http://dx.doi.org/10.1109/icce-berlin.2013.6698024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jin, Ji-fang, Er-hong Lu, and Xian-wei Gao. "Resistance DPA of RSA on Smartcard." In 2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lemarechal, A. "Introduction to fault attacks on smartcard." In 11th IEEE International On-Line Testing Symposium. IEEE, 2005. http://dx.doi.org/10.1109/iolts.2005.39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Loutrel, Marc, Pascal Urien, and Guy Pujolle. "A smartcard for authentication in WLANs." In the 2003 IFIP/ACM Latin America conference. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/1035662.1035673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Crotch-Harvey, T. "Low cost smartcard ticketing using RFID." In IET Seminar on RFID and Electronic Vehicle Identification in Road Transport. IEE, 2006. http://dx.doi.org/10.1049/ic:20060134.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Smartcard"

1

Morse, Emile, Mary Theofanos, Yee-Yin Choong, Celeste Paul, Aiping Zhang, and Hannah Wald. Usability of PIV Smartcards for Logical Access. National Institute of Standards and Technology, June 2012. http://dx.doi.org/10.6028/nist.ir.7867.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Muralidharan, Karthik, Paul Niehaus, and Sandip Sukhtankar. Building State Capacity: Evidence from Biometric Smartcards in India. Cambridge, MA: National Bureau of Economic Research, March 2014. http://dx.doi.org/10.3386/w19999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Atanda, Akinwande A. http://3ieimpact.org/evidence-hub/publications/replication-papers/biometric-smartcards-and-payment-disbursement. International Initiative for Impact Evaluation (3ie), March 2019. http://dx.doi.org/10.23846/rps0023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography