Academic literature on the topic 'Smartcard'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Smartcard.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Smartcard"
Kristanti, Ayu Dian, and Didik Setiyadi. "Sistem Pembayaran Otomatis Berbasis Contactless Smartcard dengan Teknologi RFID di Kantin SMK Taman Harapan Bekasi." Journal of Students‘ Research in Computer Science 2, no. 2 (November 30, 2021): 177–88. http://dx.doi.org/10.31599/jsrcs.v2i2.915.
Full textCherrill, D., and A. Brocklehurst. "Smartcard certfication." Information Security Technical Report 4, no. 2 (January 1999): 42–50. http://dx.doi.org/10.1016/s0167-4048(99)80013-2.
Full textCherrill, David. "Smartcard certification." Information Security Technical Report 4 (January 1999): 5–6. http://dx.doi.org/10.1016/s1363-4127(99)80021-1.
Full textAyer, Ken. "Mitigating smartcard risks." Information Security Technical Report 4 (January 1999): 6–7. http://dx.doi.org/10.1016/s1363-4127(99)80023-5.
Full textBurns, Susan, and George R. S. Weir. "Varieties of smartcard fraud." International Journal of Electronic Security and Digital Forensics 1, no. 4 (2008): 374. http://dx.doi.org/10.1504/ijesdf.2008.021455.
Full textAlyanakian, Edmond. "The Smartcard in Norway." Retail and Distribution Management 16, no. 2 (February 1988): 25–28. http://dx.doi.org/10.1108/eb018370.
Full textSun, Shichao, and Dongyuan Yang. "Identifying Public Transit Commuters Based on Both the Smartcard Data and Survey Data: A Case Study in Xiamen, China." Journal of Advanced Transportation 2018 (November 1, 2018): 1–10. http://dx.doi.org/10.1155/2018/9693272.
Full textThani, Fakhriyah Abdullah, and Muhammad Anshari. "Maximizing Smartcard for Public Usage." International Journal of Asian Business and Information Management 11, no. 2 (April 2020): 121–32. http://dx.doi.org/10.4018/ijabim.2020040108.
Full textGengler, Barbara. "US Army Chooses Smartcard Technology." Network Security 2002, no. 1 (January 2002): 5–6. http://dx.doi.org/10.1016/s1353-4858(02)00114-9.
Full text., Abu Abraham Mathews. "TRAIN TICKETING SYSTEM USING SMARTCARD." International Journal of Research in Engineering and Technology 03, no. 15 (May 25, 2014): 133–38. http://dx.doi.org/10.15623/ijret.2014.0315024.
Full textDissertations / Theses on the topic "Smartcard"
Vu, Hung V. "Healthcare Optimizing Patient Education Smartcard (H.O.P.E.S.)." Thesis, California State University, Long Beach, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10752237.
Full textThe healthcare industry is ever-changing, with the significant advancement of technology compare to 30 years ago. Access to information has become quicker and paper chart has been reduced to the implementation and the creation of an EMR/EHR system. With patients obtaining a healthcare smartcard and acts as a portable EHR, this can help clinicians communicate better with other clinicians and be able to educate their patients on drug therapies, avoid administering duplicate testing, and thus, reduce cost for both the insurance and patients side. H.O.P.E.S. is making its way in the healthcare industry to alleviate burden for patients carrying papers and lab results, when it can be store using the smartcard system. This allows clinicians to access patients’ latest results if patients are seeing multiple clinicians (specialists) for their medical conditions. The smartcard allows physicians to educate their patients, getting them more involve and advocate for a healthier lifestyle.
Henderson, Neil James. "Polymer thick film sensors for embedded smartcard biometrics and identity verification." Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268936.
Full textLeahy, Christopher John. "Understanding the Mean-Variance framework through the application of Public Transport Smartcard data." Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/18706/.
Full textKleist, Anders. "Theory of super power saving circuits and configurations for mixed signal CPU for smartcard application." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2326.
Full textDesigning an application specific integrated circuit (ASIC) must be starting with careful preparations, otherwise the chip will not be as good as possible. The theoretical studies must cover everything from the chip circuits to the application structure. In mobile applications there is extremely important that the current consumption becomes minimized because the battery power is limited. The power reductions studies must include the most power costing circuits on the chip. When the whole circuit or segments of the circuit is not in use, they must switch fast and simple into another mode that consume nearly none power. This mode is called sleep-mode. If the sleep-mode has very low leakage currents, the lifetime of the application will dramatically increase.
This report studies the most power costing circuits in smartcard application ASIC. The chip should be used to control a LCD display on the smartcard. The circuits that have been investigated are level shifters, charge pumps and LCD drivers, also sleep-mode configuration possibilities have been investigated. Other small preparing work is also included in the thesis.
Jilkén, Oskar. "Säkerhet och integritet i närfältskommunikation." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5010.
Full textI dagens samhälle används smartcards i många områden, NFC som är en smartcard teknik som tillåter kontaktlös interaktion mellan en läsare och taggen, taggen är ofta i form av ett kort. NFC kan användas till olika betalnings metoder eller som inpasseringskort vilket gör vardagen enklare. I tidigare studier har tekniken visat sig svag för attacker med hjälp av en NFC-läsare kopplad till en dator. Bland dagens smartphones finns det telefoner som har inbyggt läs- och skriv-stöd till NFC taggar. I den här studien ska jag undersöka de NFC taggar som används flitigast i vårt samhälle, inpasseringskort och betalkort för att fastställa säkerheten mot den ökade användningen av smartphones som ett potentiellt attackverktyg, om det finns en hotbild ska jag försöka avhjälpa den funna bristen. Mitt tillväga gångsätt var att välja ut ett antal testobjekt och analysera de objekten med hjälp av endast en smartphone med NFC-stöd som verktyg. För att fastställa risken för vart och ett av objekten, de test som utfördes var modifiering, kloning och unik kopiering. Genom denna undersökning kom jag fram till att fyra av de icke tomma objekten löper risk att bli utsatta för hot alla fyra används i kollektivtrafiken och objekten var sårbara för unik kopiering, för att avhjälpa denna sårbarhet bör hanteringen av taggens data hanteras på ett annat vis, kanske genom att lagra data i ett inre system eller att byta ut taggarna till ett säkrare alternativ.
Yamori, Nobuyoshi, and Narunto Nishigaki. "Recent Developments of Digital Cash Projects in Japan." 名古屋大学大学院経済学研究科附属国際経済政策研究センター, 2005. http://hdl.handle.net/2237/11922.
Full textKirk, Dean Frederick. "Development of a Small Envelope Precision Milling Machine." Thesis, University of Canterbury. Mechanical Engineering, 2006. http://hdl.handle.net/10092/2773.
Full textJensen, Jonas. "Säkerhetsutvärdering certifikatserver i stället för aktiva kort." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2844.
Full textBusiness and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card.
I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware. The method uses a server that stores all cryptographic keys for the user centrally to achieve stronger security. This report is based on a previous report which tested to implement this solution, in this report I will question the security of this system. I will then give an architecture proposal where this method is used to authenticate and allow cryptographic recourses for the user.
The conclusions you can get from this report is that the possibilities with comparable ease increase the security without investing in new hardware. But the solution will not be comparable by a ``smart card solution''in security levels. That means that the method described in this thesis is suitable for organizations that either do not need that strong security as smart card give or want a good solution without being forced to use some external hardware.
Tiran, Sébastien. "Side Channels in the Frequency Domain." Thesis, Montpellier 2, 2013. http://www.theses.fr/2013MON20164/document.
Full textNowadays, the use of cryptography is widely spread, and a lot of devices provide cryptographic functions to satisfy needs such as identification, confidentiality, ... in several fields like communication, PayTV, ...Security of these devices is thus a major issue.Side Channel Attacks consist in spying a circuit through different means like the computation time, power consumption or electromagnetic emissions to get information on the performed calculus and discover secrets such as the cipher keys.These attacks have the advantage to be cheap and undetectable, and have been studied a lot.In the context of attacks analysing the power consumption or the electromagnetic emissions, the acquisition of good traces is a crucial point.Despite the high use of preprocessing techniques in the literature, nobody has attempted to model the leakage in the frequency domain.The works performed during this thesis are focusing on this topic with the motivation of improving the efficiency of attacks.What's more, new frequency domain attacks are proposed, subject poorly studied despite the advantage of better exploiting the leakage spread in time
Kilian-Kehr, Roger. "Mobile security with smartcards." Phd thesis, [S.l.] : [s.n.], 2002. http://elib.tu-darmstadt.de/diss/000214.
Full textBooks on the topic "Smartcard"
Publishing, Kagan. Kagan SmartCard teacher toolbox. San Clemente, Calif.]: Kagan Publishing, 2011.
Find full textEnterprise, Inc Acumen Building. Smartcard interoperability issues for the transit industry. Washington, D.C: Transportation Research Board, 2006.
Find full textElliott, S. Smartcard technology: The commercial applications and strategic implications. Oxford: Oxford Brookes University, 1995.
Find full textInc, Sun Microsystems. Solaris Smartcard Administration Guide. Iuniverse Inc, 2002.
Find full textSun Microsystems Inc. Solaris Smartcard Administration Guide. Iuniverse Inc, 2005.
Find full textBook chapters on the topic "Smartcard"
Langer, Josef, and Michael Roland. "Smartcard Technologie." In Anwendungen und Technik von Near Field Communication (NFC), 33–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-05497-6_3.
Full textPöhls, Henrich C., and Joachim Posegga. "Smartcard Firewalls Revisited." In Smart Card Research and Advanced Applications, 179–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11733447_13.
Full textKuhn, Markus. "Smartcard Tamper Resistance." In Encyclopedia of Cryptography and Security, 1225–27. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_228.
Full textEl Kalam, Anas Abou, Yves Deswarte, Gilles Trouessin, and Emmanuel Cordonnier. "Smartcard-Based Anonymization." In IFIP International Federation for Information Processing, 49–66. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8147-2_4.
Full textKehr, Roger, Michael Rohs, and Harald Vogt. "Issues in Smartcard Middleware." In Lecture Notes in Computer Science, 90–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45165-x_7.
Full textBurns, Susan, and George R. S. Weir. "Trends in Smartcard Fraud." In Communications in Computer and Information Science, 40–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-69403-8_5.
Full textBella, Giampaolo. "Verifying a Smartcard Protocol." In Formal Correctness of Security Protocols, 165–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-68136-6_11.
Full textSchaffer, Holger. "Praxisbeispiel: Junghans-SmartCard-Uhren." In E-Commerce und E-Payment, 329. Wiesbaden: Gabler Verlag, 2001. http://dx.doi.org/10.1007/978-3-322-86953-1_8.
Full textMartinelli, Fabio. "Biometrics to Enhance Smartcard Security." In Security Protocols, 333–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_40.
Full textBarthe, Gilles, and Guillaume Dufay. "Formal Methods for Smartcard Security." In Foundations of Security Analysis and Design III, 133–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11554578_5.
Full textConference papers on the topic "Smartcard"
Farissi, Ilhame El, Mostafa Azizi, and Mimoun Moussaoui. "Classification of smartcard attacks." In 2011 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2011. http://dx.doi.org/10.1109/icmcs.2011.5945583.
Full textLathia, Neal, and Licia Capra. "How smart is your smartcard?" In the 13th international conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2030112.2030152.
Full textPleunis, John, and Michal Stala. "Multi-application smartcard user interface." In the 2nd European Union symposium. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1031419.1031426.
Full textBamforth, R. "Java - from smartcard to supercomputer." In IEE Colloquium on Issues for Networked Interpersonal Communicators. IEE, 1997. http://dx.doi.org/10.1049/ic:19970766.
Full textMucini, Luciano. "Manual de procedimentos SMARTCARD: módulo cliente." In Simpósio de Profissionais da UNICAMP. Universidade Estadual de Campinas, 2019. http://dx.doi.org/10.20396/sinteses.v0i7.10277.
Full textKhan, M. Fahim Ferdous, and Ken Sakamura. "Towards securer and smarter smartcard applications." In 2013 IEEE Third International Conference on Consumer Electronics ¿ Berlin (ICCE-Berlin). IEEE, 2013. http://dx.doi.org/10.1109/icce-berlin.2013.6698024.
Full textJin, Ji-fang, Er-hong Lu, and Xian-wei Gao. "Resistance DPA of RSA on Smartcard." In 2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.301.
Full textLemarechal, A. "Introduction to fault attacks on smartcard." In 11th IEEE International On-Line Testing Symposium. IEEE, 2005. http://dx.doi.org/10.1109/iolts.2005.39.
Full textLoutrel, Marc, Pascal Urien, and Guy Pujolle. "A smartcard for authentication in WLANs." In the 2003 IFIP/ACM Latin America conference. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/1035662.1035673.
Full textCrotch-Harvey, T. "Low cost smartcard ticketing using RFID." In IET Seminar on RFID and Electronic Vehicle Identification in Road Transport. IEE, 2006. http://dx.doi.org/10.1049/ic:20060134.
Full textReports on the topic "Smartcard"
Morse, Emile, Mary Theofanos, Yee-Yin Choong, Celeste Paul, Aiping Zhang, and Hannah Wald. Usability of PIV Smartcards for Logical Access. National Institute of Standards and Technology, June 2012. http://dx.doi.org/10.6028/nist.ir.7867.
Full textMuralidharan, Karthik, Paul Niehaus, and Sandip Sukhtankar. Building State Capacity: Evidence from Biometric Smartcards in India. Cambridge, MA: National Bureau of Economic Research, March 2014. http://dx.doi.org/10.3386/w19999.
Full textAtanda, Akinwande A. http://3ieimpact.org/evidence-hub/publications/replication-papers/biometric-smartcards-and-payment-disbursement. International Initiative for Impact Evaluation (3ie), March 2019. http://dx.doi.org/10.23846/rps0023.
Full text