Dissertations / Theses on the topic 'Smartcard'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 40 dissertations / theses for your research on the topic 'Smartcard.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Vu, Hung V. "Healthcare Optimizing Patient Education Smartcard (H.O.P.E.S.)." Thesis, California State University, Long Beach, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10752237.
Full textThe healthcare industry is ever-changing, with the significant advancement of technology compare to 30 years ago. Access to information has become quicker and paper chart has been reduced to the implementation and the creation of an EMR/EHR system. With patients obtaining a healthcare smartcard and acts as a portable EHR, this can help clinicians communicate better with other clinicians and be able to educate their patients on drug therapies, avoid administering duplicate testing, and thus, reduce cost for both the insurance and patients side. H.O.P.E.S. is making its way in the healthcare industry to alleviate burden for patients carrying papers and lab results, when it can be store using the smartcard system. This allows clinicians to access patients’ latest results if patients are seeing multiple clinicians (specialists) for their medical conditions. The smartcard allows physicians to educate their patients, getting them more involve and advocate for a healthier lifestyle.
Henderson, Neil James. "Polymer thick film sensors for embedded smartcard biometrics and identity verification." Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268936.
Full textLeahy, Christopher John. "Understanding the Mean-Variance framework through the application of Public Transport Smartcard data." Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/18706/.
Full textKleist, Anders. "Theory of super power saving circuits and configurations for mixed signal CPU for smartcard application." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2326.
Full textDesigning an application specific integrated circuit (ASIC) must be starting with careful preparations, otherwise the chip will not be as good as possible. The theoretical studies must cover everything from the chip circuits to the application structure. In mobile applications there is extremely important that the current consumption becomes minimized because the battery power is limited. The power reductions studies must include the most power costing circuits on the chip. When the whole circuit or segments of the circuit is not in use, they must switch fast and simple into another mode that consume nearly none power. This mode is called sleep-mode. If the sleep-mode has very low leakage currents, the lifetime of the application will dramatically increase.
This report studies the most power costing circuits in smartcard application ASIC. The chip should be used to control a LCD display on the smartcard. The circuits that have been investigated are level shifters, charge pumps and LCD drivers, also sleep-mode configuration possibilities have been investigated. Other small preparing work is also included in the thesis.
Jilkén, Oskar. "Säkerhet och integritet i närfältskommunikation." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5010.
Full textI dagens samhälle används smartcards i många områden, NFC som är en smartcard teknik som tillåter kontaktlös interaktion mellan en läsare och taggen, taggen är ofta i form av ett kort. NFC kan användas till olika betalnings metoder eller som inpasseringskort vilket gör vardagen enklare. I tidigare studier har tekniken visat sig svag för attacker med hjälp av en NFC-läsare kopplad till en dator. Bland dagens smartphones finns det telefoner som har inbyggt läs- och skriv-stöd till NFC taggar. I den här studien ska jag undersöka de NFC taggar som används flitigast i vårt samhälle, inpasseringskort och betalkort för att fastställa säkerheten mot den ökade användningen av smartphones som ett potentiellt attackverktyg, om det finns en hotbild ska jag försöka avhjälpa den funna bristen. Mitt tillväga gångsätt var att välja ut ett antal testobjekt och analysera de objekten med hjälp av endast en smartphone med NFC-stöd som verktyg. För att fastställa risken för vart och ett av objekten, de test som utfördes var modifiering, kloning och unik kopiering. Genom denna undersökning kom jag fram till att fyra av de icke tomma objekten löper risk att bli utsatta för hot alla fyra används i kollektivtrafiken och objekten var sårbara för unik kopiering, för att avhjälpa denna sårbarhet bör hanteringen av taggens data hanteras på ett annat vis, kanske genom att lagra data i ett inre system eller att byta ut taggarna till ett säkrare alternativ.
Yamori, Nobuyoshi, and Narunto Nishigaki. "Recent Developments of Digital Cash Projects in Japan." 名古屋大学大学院経済学研究科附属国際経済政策研究センター, 2005. http://hdl.handle.net/2237/11922.
Full textKirk, Dean Frederick. "Development of a Small Envelope Precision Milling Machine." Thesis, University of Canterbury. Mechanical Engineering, 2006. http://hdl.handle.net/10092/2773.
Full textJensen, Jonas. "Säkerhetsutvärdering certifikatserver i stället för aktiva kort." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2844.
Full textBusiness and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card.
I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware. The method uses a server that stores all cryptographic keys for the user centrally to achieve stronger security. This report is based on a previous report which tested to implement this solution, in this report I will question the security of this system. I will then give an architecture proposal where this method is used to authenticate and allow cryptographic recourses for the user.
The conclusions you can get from this report is that the possibilities with comparable ease increase the security without investing in new hardware. But the solution will not be comparable by a ``smart card solution''in security levels. That means that the method described in this thesis is suitable for organizations that either do not need that strong security as smart card give or want a good solution without being forced to use some external hardware.
Tiran, Sébastien. "Side Channels in the Frequency Domain." Thesis, Montpellier 2, 2013. http://www.theses.fr/2013MON20164/document.
Full textNowadays, the use of cryptography is widely spread, and a lot of devices provide cryptographic functions to satisfy needs such as identification, confidentiality, ... in several fields like communication, PayTV, ...Security of these devices is thus a major issue.Side Channel Attacks consist in spying a circuit through different means like the computation time, power consumption or electromagnetic emissions to get information on the performed calculus and discover secrets such as the cipher keys.These attacks have the advantage to be cheap and undetectable, and have been studied a lot.In the context of attacks analysing the power consumption or the electromagnetic emissions, the acquisition of good traces is a crucial point.Despite the high use of preprocessing techniques in the literature, nobody has attempted to model the leakage in the frequency domain.The works performed during this thesis are focusing on this topic with the motivation of improving the efficiency of attacks.What's more, new frequency domain attacks are proposed, subject poorly studied despite the advantage of better exploiting the leakage spread in time
Kilian-Kehr, Roger. "Mobile security with smartcards." Phd thesis, [S.l.] : [s.n.], 2002. http://elib.tu-darmstadt.de/diss/000214.
Full textDrageryd, Lars. "Using public transport tap-in data to improve a travel demand model: A Norrköping case study." Thesis, Linköpings universitet, Kommunikations- och transportsystem, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-151065.
Full textFaria, Gerson de Souza. "Novos ataques de canal secundário a dispositivos de entrada manual de dados confidenciais." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-22032017-080657/.
Full textThis thesis presents three new attacks on electronic payment equipment having mechanical keypads, known as \"PIN pads\". We show in three different ways how they have security vulnerabilities at the physical layer allowing the leak of the PIN (Personal Identification Number) when it is entered. We experimentally demonstrated that it is possible to infer with high success rate (100% in one of the attacks) the password entered on the device, in a non-invasive way. The attacks are based on the placement of sensors inside the equipment itself or in its operating environment: accelerometers for doing vibration analysis, microphones for acoustic analysis and load cells for measuring the pressing force. Due to massive deployment of sensors in consumer devices, information theft by unconventional means is increasing. The results of the low-cost attacks here developed expose serious shortcomings in the process of security certification of such equipment.
Dureuil, Louis. "Analyse de code et processus d'évaluation des composants sécurisés contre l'injection de faute." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM068/document.
Full textVulnerability detections for smart cards require state of the art methods both to attack and to protect the secure device. A typical type of attack is fault injection, most notably performed by means of laser techniques. To prevent some of the consequences of this kind of attacks, several analyses are conducted at the software level. Being able to define criteria and to propose automated tools that can survey the robustness of an application to fault injection is thus nowadays a hot topic, even more so since the hardware attack techniques allow today an attacker to perform several attacks in a single software execution. Indeed, recent research works evaluate the effectiveness of counter-measures against fault injection[1], or attempt to develop models of fault injection at the C level[2]. This thesis project addresses the issue of multiple faults injection, albeit by adding the distinctive aspect of static and dynamic analysis interaction in a context of binary-level fault injection. An objective of the thesis is to achieve a configurable framework to simulate fault injections in the way they are currently performed by the CESTI-LETI laboratory on the actual hardware. To do so we will develop a generic intermediate model that will allow us to specify hardware constraints, such as the various kinds of memories (RAM, EEPROM, ROM), whose different properties can induce either permanent or volatile faults. Combining the static code analysis with dynamic fault injections should prevent the combinatory explosion of the executiions while attack patterns will guide the analysis. A taxonomy of attacks and new attack modelisations could emerge from this work. An adaption of the tools for static analysis is also required, because dynamic fault injection can deeply change the code by modifying the interpretation of the instructions, in a similar manner to dynamic compilation. This thesis project falls within the CESTI-LETI's innovation strategy, et could lead to an automated code verifier that could be used by the CESTI-LETI evaluation specialists. [1] A. Séré, J-L. Lanet et J. Iguchi-Cartigny. « Evaluation of Countermeasures Against Fault Attacks on Smart Cards ». en. In : International Journal of Security and Its Applications 5.2 (2011). [2] Xavier Kauffmann-Tourkestansky. « Analyses sécuritaires de code de carte à puce sous attaques physiques simulées ». Français. THESE. Université d’Orléans, nov. 2012. url : http://tel.archives-ouvertes.fr/tel-00771273
Gomes, Bruno Emerson Gurgel. "Desenvolvimento formal de aplica??es para smartcards." Universidade Federal do Rio Grande do Norte, 2012. http://repositorio.ufrn.br:8080/jspui/handle/123456789/17947.
Full textCoordena??o de Aperfei?oamento de Pessoal de N?vel Superior
Smart card applications represent a growing market. Usually this kind of application manipulate and store critical information that requires some level of security, such as financial or confidential information. The quality and trustworthiness of smart card software can be improved through a rigorous development process that embraces formal techniques of software engineering. In this work we propose the BSmart method, a specialization of the B formal method dedicated to the development of smart card Java Card applications. The method describes how a Java Card application can be generated from a B refinement process of its formal abstract specification. The development is supported by a set of tools, which automates the generation of some required refinements and the translation to Java Card client (host) and server (applet) applications. With respect to verification, the method development process was formalized and verified in the B method, using the Atelier B tool [Cle12a]. We emphasize that the Java Card application is translated from the last stage of refinement, named implementation. This translation process was specified in ASF+SDF [BKV08], describing the grammar of both languages (SDF) and the code transformations through rewrite rules (ASF). This specification was an important support during the translator development and contributes to the tool documentation. We also emphasize the KitSmart library [Dut06, San12], an essential component of BSmart, containing models of all 93 classes/interfaces of Java Card API 2:2:2, of Java/Java Card data types and machines that can be useful for the specifier, but are not part of the standard Java Card library. In other to validate the method, its tool support and the KitSmart, we developed an electronic passport application following the BSmart method. We believe that the results reached in this work contribute to Java Card development, allowing the generation of complete (client and server components), and less subject to errors, Java Card applications.
As aplica??es para smart cards representam um mercado que cresce a cada ano. Normalmente, essas aplica??es manipulam e armazenam informa??es que requerem garantias de seguran?a, tais como valores monet?rios ou informa??es confidenciais. A qualidade e a seguran?a do software para cart?es inteligentes pode ser aprimorada atrav?s de um processo de desenvolvimento rigoroso que empregue t?cnicas formais da engenharia de software. Neste trabalho propomos o m?todo BSmart, uma especializa??o do m?todo formal B dedicada ao desenvolvimento de aplica??es para smart cards na linguagem Java Card. O m?todo descreve, em um conjunto de etapas, como uma aplica??o smart card pode ser gerada a partir de refinamentos em sua especifica??o formal. O desenvolvimento ? suportado por um conjunto de ferramentas, automatizando a gera??o de parte dos refinamentos e a tradu??o para as aplica??es Java Card cliente (host) e servidora (applet). Ressalta-se que o processo de especifica??o e refinamento descrito no m?todo foi formalizado e verificado utilizando o pr?prio m?todo B, com o aux?lio da ferramenta Atelier B [Cle12a]. Destaca-se que a aplica??o Java Card ? traduzida a partir do ?ltimo passo de refinamento, denominado de implementa??o. A especifica??o dessa tradu??o foi feita na linguagem ASF+SDF [BKV08]. Inicialmente, descreveu-se as gram?ticas das linguagens B e Java (SDF) e, em uma etapa posterior, especificou-se as transforma??es de B para Java Card atrav?s de regras de reescrita de termos (ASF). Essa abordagem foi um importante aux?lio durante o processo de tradu??o, al?m de servir ao prop?sito de document?lo. Cumpre destacar a biblioteca KitSmart [Dut06, San12], componente essencial ao m?todo BSmart, que inclui modelos em B de todas as 93 classes/interfaces da API Java Card na vers?o 2:2:2, dos tipos de dados Java e Java Card e de m?quinas que podem ser ?teis ao especificador, mas que n?o est?o presentes na API padr?o. Tendo em vista validar o m?todo, seu conjunto de ferramentas e a biblioteca KitSmart, procedeu-se com o desenvolvimento, seguindo o m?todo BSmart, de uma aplica??o de passaporte eletr?nico. Os resultados alcan?ados neste trabalho contribuem para o desenvolvimento smart card, na medida em que possibilitam a gera??o de aplica??es Java Card completas (cliente e servidor) e menos sujeitas a falhas.
Andouard, Philippe. "Outils d'aide à la recherche de vulnérabilités dans l'implantation d'applications embarquées sur carte à puce." Thesis, Bordeaux 1, 2009. http://www.theses.fr/2009BOR13958/document.
Full textThe work presented in this thesis aims at easing the evaluation process of smartcards embedded software. On one hand, we set up a software environment dedicated to analyze the implementation resistance of cryptographic to power analysis attacks. This environment must be seen as a tool that facilitates a real attack by giving a way to find information leakages in an implementation. On the other hand, we focused on analyzing program written in AVR assembly language in order to check whether they are vulnerable to timing attacks. To achieve this goal we have developed a tool that makes possible the description of a path in the control flow of the program thanks to regular expressions. Those regular expressions will be interpreted by our tool in order to give the exact execution timing (expressed in clock cycles). Finally, we studied how to ease the global comprehension of a program written in C language in order to check whether security policies are well implemented. First, we provide graphical navigation assisants that helps to understand the progam being analyzed by giving information on variables and procedures. Then, we provide a way to check the security policies through the use of requests expressed with the CTL logic. This approach does not need prior modelisation of the program
Kneip, Sascha. "Entwicklung effizienter Schaltungskomponenten für einen kryptographischen Koprozessor in Smartcards." Aachen Shaker, 2008. http://d-nb.info/994112629/04.
Full textKneip, Sascha [Verfasser]. "Entwicklung effizienter Schaltungskomponenten für einen kryptographischen Koprozessor in Smartcards / Sascha Kneip." Aachen : Shaker, 2009. http://d-nb.info/1161302638/34.
Full textSo, Yiu-ching Abby. "Sequential uniform design and its application to quality improvement in the manufacture of smartcards." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B35772025.
Full textSo, Yiu-ching Abby, and 蘇耀正. "Sequential uniform design and its application to quality improvement in the manufacture of smartcards." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B35772025.
Full textLesas, Anne-Marie. "Vers un environnement logiciel générique et ouvert pour le développement d'applications NFC sécurisées." Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0286/document.
Full textIn the field of electronic transactions and payment with a smart card, the Near Field Communication (NFC) standard has stood out against other candidate technologies for secure mobile contactless transactions for payment, access control, or authentication. Secure mobile contactless services are based on the card emulation mode of the NFC standard which involves a smart card type component with restricted access called "Secure Element" (SE) in which sensitive data and sensitive functions are securely stored and run. Despite considerable standardization efforts around the SE ecosystem, the proposed models for the implementation of SE are complex and suffer from the lack of genericity, both to offer abstraction mechanisms, for the development of high-level applications, and for the implementation and verification of applications security constraints.The objective of the thesis is to design and realize a software environment based on a generic model that complies with established standards and which is not very sensitive to technological evolutions. This environment should enable non-experts to develop multi-platform, multi-mode, multi-factor SE-based applications running into the NFC smartphone
Juras, Stanislav. "Autentizace pomocí smartkaret." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218350.
Full textGalia, Fabrice. "Supervision automatique de la ventilation artificielle en soins intensifs : investigation d'un système existant et propositions d'extensions." Phd thesis, Université Paris-Est, 2010. http://tel.archives-ouvertes.fr/tel-00627248.
Full textThuillet, Céline. "Implantations cryptographiques sécurisées et outils d’aide à la validation des contremesures contre les attaques par canaux cachés." Thesis, Bordeaux 1, 2012. http://www.theses.fr/2012BOR14508/document.
Full textFor several years, the security components such as smart cards are subject to side channel attacks. These attacks allow to exhibit secrets by analyzing the physical characteristics such as power consumption or execution time. As part of this thesis, two countermeasures were carried out and applied to the AES (symmetric cipher). In addition, to help future development of countermeasures and their validation, a simulator was developed. It realizes attacks using a power consumption model defined in the early phases of development. Finally, I participated in working groups that have proposed Shabal to SHA-3 competition, which aims to define a new standard for hash functions. Hardware implementations have been made thereafter
Pettinari, Federico. "Un Framework per Simulazione e Sviluppo di Sistemi Aggregati di Smart-Camera." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/19092/.
Full textNgueya, Wandji Steve. "Conception de circuits mémoires flash pour plateforme ultra faible consommation." Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0586.
Full textThe market of secure connected devices is booming and requires low power development platforms for contactless applications in reduced form factors. The reduction in the form factor impacts the antenna size and thus leads to a decrease of the energy available in the chip, which should reduce drastically its consumption while keeping performances. One of the main contributors to the chip consumption is the embedded non-volatile memory (eNVM) used for storage and code execution. Therefore, for a given technology, it is necessary to design peripheral blocks of the memory array under strong consumption constraints. The aim of the thesis is to select a very low-power embedded nonvolatile memory technology compatible with the classical CMOS process, to identify the critical blocks during the operations of the memory, and finally to propose solutions to minimize the power consumption of each critical block.In order to do this, a study of all the embedded non-volatile memories available on the market is carried out. It emerges that the Flash technology, in particular the SuperFlash® ESF3 based NOR Flash technology, is best suited for remote-powered systems. The study of the NOR Flash macrocell shows that during write and erase operations, the system consumption is mainly related to the high voltage generation by charge pumps. However, during a read operation, overall performances of the system is determined by the sense amplifier. A design work for each individual block is then implemented to reduce consumption
"An asynchronous DES in contactless smartcard." 2004. http://library.cuhk.edu.hk/record=b5891905.
Full textThesis submitted in: August 2003.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.
Includes bibliographical references (leaves 104-109).
Abstracts in English and Chinese.
list of figures --- p.5
list of tables --- p.7
acknowledgements --- p.8
abstract --- p.9
Chapter 1. --- introduction --- p.12
Chapter 1.1 --- Smart Card --- p.12
Chapter 1.1.1 --- What is a smart card? --- p.12
Chapter 1.1.2 --- How is a smart card different from the magnetic stripe card that I carry in my wallet? --- p.13
Chapter 1.1.3 --- Why are interoperability and enforced standards crucial to widespread adoption of smart cards? --- p.13
Chapter 1.1.4 --- Contact vs Contactless --- p.14
Chapter 1.1.5 --- How secure and confidential contactless smart cards are? --- p.14
Chapter 1.1.6 --- Contactless Smart Card Application Contactless smart cards are widely used in commercial fields as stored-value and secure storage cards --- p.14
Chapter 1.1.7 --- What are the major benefits that Contactless smart cards offer to consumers? --- p.16
Chapter 1.2 --- Design Motivation --- p.16
Chapter 1.3 --- RF Part Interface --- p.17
Chapter 1.4 --- Potential Advantages of Using Asynchronous Circuit --- p.19
Chapter 1.5 --- Design Methodology for Asynchronous Circuit --- p.23
Chapter 1.5.1 --- Difficulty and limitation of asynchronous design --- p.27
Chapter 1.5.2 --- Asynchronous pipeline --- p.28
Chapter 2. --- background theory --- p.32
Chapter 2.1 --- Description of DES --- p.32
Chapter 2.1.1 --- Outline of the Algorithm --- p.33
Chapter 2.1.2 --- Initial Permutation --- p.35
Chapter 2.1.3 --- Key Transformation --- p.35
Chapter 2.1.4 --- Expansion Permutation --- p.37
Chapter 2.1.5 --- S-box Substitution --- p.38
Chapter 2.1.6 --- P-Box Permutation --- p.41
Chapter 2.1.7 --- Final Permutation --- p.42
Chapter 2.1.8 --- Decrypting DES --- p.43
Chapter 2.1.9 --- Security of DES --- p.43
Chapter 2.1.10 --- Weak Keys --- p.43
Chapter 2.1.11 --- Algebraic Structure --- p.46
Chapter 2.1.12 --- Key Length --- p.46
Chapter 2.1.13 --- Number of Rounds --- p.48
Chapter 2.1.14 --- Design of the S-Boxes --- p.48
Chapter 3. --- rf part --- p.50
Chapter 3.1 --- Power On --- p.51
Chapter 3.2 --- Power Induction --- p.52
Chapter 3.3 --- Limiter and Regulator --- p.54
Chapter 3.4 --- Demodulation --- p.56
Chapter 3.5 --- Modulation --- p.57
Chapter 4. --- asynchronous circuit theory --- p.58
Chapter 4.1 --- Potential Problem of Classical Asynchronous Pipeline --- p.58
Chapter 4.2 --- The New Handshake Cell --- p.58
Chapter 4.3 --- The Modified Asynchronous Pipeline Architecture --- p.60
Chapter 4.4 --- Asynchronous Circuit Comparison --- p.65
Chapter 5 --- implementation --- p.67
Chapter 5.1 --- DES Implementation --- p.67
Chapter 5.1.1 --- Power estimation of the asynchronous DES --- p.70
Chapter 5.1.2 --- Modified Circuit --- p.73
Type One --- p.73
Type two --- p.76
Chapter 5.1.3 --- Interface --- p.79
Chapter 5.1.4 --- Shift Unit --- p.80
Chapter 5.1.5 --- Multiplexer Unit --- p.82
Chapter 5.1.6 --- Compression Unit --- p.83
Chapter 5.1.7 --- Expansion Unit --- p.84
Chapter 5.1.8 --- Xor Unit --- p.85
Chapter 5.1.9 --- S_box Unit --- p.86
Chapter 5.1.10 --- P-box unit --- p.88
Chapter 5.1.11 --- Latch unit --- p.89
Chapter 5.1.12 --- Transmission Unit --- p.90
Chapter 5.2 --- Floor Plan Design --- p.90
Chapter 6. --- result and discussion --- p.93
Chapter 6.1 --- Simulation Result --- p.93
Chapter 6.2 --- Measurement --- p.97
Chapter 6.3 --- Comparison --- p.101
Chapter 6.4 --- Conclusion --- p.101
Chapter 7. --- reference --- p.104
Chapter 8. --- appendix --- p.110
Chapter 8.1 --- RF Part Implementation --- p.110
Chapter 8.1.1 --- Full wave rectifying circuit --- p.110
Chapter 8.1.2 --- "Limiting Circuit," --- p.111
Chapter 8.1.3 --- Regulator circuit --- p.113
Chapter 8.1.4 --- Demodulation circuit --- p.113
Chapter 8.1.5 --- Simulation of the RF part --- p.115
Chapter 8.2 --- New Technology for Designing a RF Interface --- p.117
Chapter 8.2 --- Block Diagrams --- p.118
Chen, Kuei-Fu, and 陳癸夫. "SecCap:Automatically Securing Personal Documents with Smartcard Authentication." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/77387438045175474089.
Full text國立交通大學
資訊科學與工程研究所
96
Document security is now an important issue on personal computer. According to the statistics show[25], as high as 92% of end-users are using Microsoft Windows operating system of the world. In which, 90% of users will not encrypt to protect their confidential documents in their computers. More than 80% of security threats are issued from internal of company[20]. If the attacker, who think to steal data, can obtain the computer entity, all unencrypted documents are exposed. The user will not encrypt his confidential documents because he thinks it needs more complex procedure to encrypt them manually, or does not understand the importance of encryption protection. In view of this, in this paper, we propose a software system: SecCap, which is based on NTFS file system, Windows user and key management. SecCap authenticates the user by smartcard, and automatically encrypts the confidential documents with acceptable overhead. This is the main hope to solve above problem, so that users can more easily reach to goal of personal document security.
Yen-Hung, Chen. "An Implementation of PMI+ on Low-Cost SmartCard." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2707200503092200.
Full textYang, Shih-Sian, and 楊士賢. "Design and Implementation of a Security Mechanism for Smartcard." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/78768w.
Full text國立中山大學
電機工程學系研究所
97
In this thesis, we used a encryption mechanism based on AES(Advenced Encryption Standard). Except for this mechanism, we also combine RS-232 Serial Communication Control, Smartcard and EM card which originally used in the Entrance Guard System to implement a new system. Eventually, this new system applies to a certain rental system practically. We also introduce some functions of this rental system based on the encryption mechanism, station initialization, bike rental, bike allocation and bike rental for credit card for example. In addition, we will describe what problems we met and the solutions we introduced to the problems finally.
Kuo, Wei-Chih, and 郭韋志. "A Study of Authorization Mechanisms with SmartCard in WebATM." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/90457863745690583255.
Full text世新大學
資訊管理學研究所(含碩專班)
94
With the vigorous development of Internet nowadays, people increasingly rely on it and have various Internet-based transactions at their convenience, for example, electronic auction, electronic cash, electronic payment and electronic bid. As regards personal transaction, people now can utilize the on-line bank to check the balance of their account, to settle payments and to do investments. Those on-line functions save the user’s transportation cost & waiting time at the back counters. To provide those on-line services, however, the banks have plenty of cost to cover because every on-line user needs to be authenticated as that bank’s customer and get the security certificate. In the past few years, the fraud group has run amuck to cheat many people financially. The government then implement the usage of IC card in 2005 to replace the easily duplicated bar magnet card. The rollout of the IC card has enhanced the transactions security greatly and provides the platform for WebATM. Comparing to a physical ATM, the only function that the WebATM does not support is to withdraw really cash from it. Except for it, people can operate much more transactions on WebATM with the punishment of various functions provided by the bank. The concept of authorization has become very important due to the trend of increasingly on-line transactions and the idea of AAA. This research is based on the how the authorization mechanism of the Smart card can be utilized on the current WebATM system in order to meet the needs of the customers, the bank and the merchants in the future to perform diversified transactions.
邱詩淳. "Exploring Smartcard and Data Mining to Improve Bus Operation Strategies." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/52028853440650314502.
Full text中華大學
運輸科技與物流管理學系(所)
95
In the past, the researches about bus operation have had the same shortage, which was always without complete and reliable OD Table. Fortunately, after the popularity of Taipei Smartcard, the data of rider pay can be recorded by Smartcard at the same time. Gradually, the public transportation has become a large database industry, which has many useful concealed information. In addition, data mining is also a good technique to analyze the stored data in large databases to discover potential information and knowledge. This research constructs real passenger OD Table by Taipei Smartcard System’s data and Taipei County e-bus System’s data. As well as explore real OD Table to generate bus operation strategies. This research discusses the short-turn service route and express service route. It applied Data Mining technology about clustering and association rules to figure out optimal short-turn service route and optimal express service route, with the objective to save maximum the sum of operator’s cost (including traveling time cost and distance cost)and passengers’ travel time cost (including in-vehicle time cost and waiting time cost). A case study by 802 route shows an optimal condition. By this research, the result shows that the best improving effect of short-turn service is the afternoon peak time period, and the best improving effect of express service is the morning peak time period. It also reflects that operators should base on passengers’ demand to adjust their operational strategies. Overall, the effect of short-turn service is better than express service. However, the performance of optimal short-turn service route solution surpasses the present short-turn service. By the sensitive analysis, excluding from the cost of passenger’s waiting time, we could save more total cost if other factors’ costs arise. It implies that providing customized service not only the passengers may get more suitable bus service but also the operator may save more cost.
Chiu, Shih-Chun, and 邱詩淳. "Exploring Smartcard and Data Mining to Improve Bus Operation Strategies." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/03279307704703251563.
Full text中華大學
運輸科技與物流管理學系碩士班
94
In the past, the researches about bus operation have had the same shortage, which was always without complete and reliable OD Table. Fortunately, after the popularity of Taipei Smartcard, the data of rider pay can be recorded by Smartcard at the same time. Gradually, the public transportation has become a large database industry, which has many useful concealed information. In addition, data mining is also a good technique to analyze the stored data in large databases to discover potential information and knowledge. This research constructs real passenger OD Table by Taipei Smartcard System’s data and Taipei County e-bus System’s data. As well as explore real OD Table to generate bus operation strategies. This research discusses the short-turn service route and express service route. It applied Data Mining technology about clustering and association rules to figure out optimal short-turn service route and optimal express service route, with the objective to save maximum the sum of operator’s cost(including traveling time cost and distance cost)and passengers’ travel time cost(including in-vehicle time cost and waiting time cost). A case study by 802 route shows an optimal condition. By this research, the result shows that the best improving effect of short-turn service is the afternoon peak time period, and the best improving effect of express service is the morning peak time period. It also reflects that operators should base on passengers’ demand to adjust their operational strategies. Overall, the effect of short-turn service is better than express service. However, the performance of optimal short-turn service route solution surpasses the present short-turn service. By the sensitive analysis, excluding from the cost of passenger’s waiting time, we could save more total cost if other factors’ costs arise. It implies that providing customized service not only the passengers may get more suitable bus service but also the operator may save more cost.
Chen, Chien-Hung, and 陳建宏. "The study of consumers’ use intention on contactless smartcard —the case of Taipei EasyCard." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/70701178153263725014.
Full text國立成功大學
交通管理學系碩博士班
92
The contactless smartcard is a new ticketing medium used in public transport. Besides satisfying the consumers’ convience, it could promote the rate of use. The purpose of this study therefore is to investigate the determinants of use intention. Data for this study was collected from the questionnaire survey, and the questionnaires were distributed to 300 consumers at public transport locations in Taipei, 194 vaild questionnaires were returned with a response rate of 65%. By the factor analysis, the results indicate that the most important nine determinants are correctness, ticket appearance, cost, security, generality, consumers service, advertisement, diversification, and service coverage. It is also found that the consumers could be divided into three segments, all-importance oriented, all-non importance oriented, and pursuing newfangled oriented. The Structual Equation Model (SEM) was used to examine the effect of Product Performance, Infrastructure, Marketing, and Function Values on consumers’ use intention. The results showed the Product Performance, Marketing and Function Values influenced the use intention directly. Finally, some useful suggestions were provided to the EasyCard company, subsequent studies and future ticket systems, to prevent the same mistatkes from happening again.
"Exploring socio-technical relations : perceptions of Saskatoon Transit’s go-pass smartcard and electronic fare system." Thesis, 2012. http://hdl.handle.net/10388/ETD-2012-12-915.
Full textMalungana, Lario. "A framework for the implementation of smartcard system for grant payments in rural South Africa." 2015. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001929.
Full textThe South African government provides grants for social assistance as an income. The Social Grant is paid by South African Social Security Agency (SASSA) using the Smartcard System for distribution of funds to beneficiaries who are classified as: Old Age Grant; Child Grant; War Veteran Grant; Foster Care Grant; Disability Grant; Care Dependency Grant; and Grant-in-Aid. Smartcard System was implemented for the developed countries and developing countries, however, in South Africa, the implementation appears to have some deficiencies. The implementation in the rural areas is not the same as the one in the urban areas due to technical infrastructure and training. The main objective of this study is to determine factors that contribute to successful implementation of Smartcard System and to develop an appropriate framework for the implementation of the Smartcard System in rural South Africa. aim of this research.
Rensleigh, Christopher William. "Veilige indentifikasietegnieke vir gebruikers van rekenaarstelsels." Thesis, 2014. http://hdl.handle.net/10210/12329.
Full text林明憲. "以健保申報制度與SmartCard為基礎之病史查詢及醫療資訊交換安全機制." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/49797582831235628439.
Full textKilian-Kehr, Roger [Verfasser]. "Mobile security with smartcards / von Roger Kilian-Kehr." 2002. http://d-nb.info/964581590/34.
Full textLin, Li-Chu, and 林麗珠. "Integrating Smartcards in to The Fare System in Buses and Rapid Transportation Systems in Taipei Metropolitan Area." Thesis, 1997. http://ndltd.ncl.edu.tw/handle/42094790623926763817.
Full text國立交通大學
交通運輸研究所
85
Integrating Smartcards in to The Fare System in BusesAnd Rapid Transportation Systems in TaipeiMetropolitan AreaStudent: Li-Chu Lin Advisor: Dr. Cheng-ch''uan HuangInstitute of Traffic and TransportationNational Chiao Tung UniversityABSIRACTThe application of smartcards is increasing. In transportation, we use it in systems including railroads, buses, MRT, Taxis, parking, tolls, etc. To solve the problem of fare system in buses and MRT systems in Taipei effectively, we integrate smartcards into the fare system. Therefore, the goal in this stage is to reach the point where "one single cards can need to get around in Taipei".The purpose of this study is to discuss the development and application in automatic electronic fare collection systems in MT systems all over the world, and examine the present fare system in buses and MRT systems in Taipei metropolitan area. Secondary, to analyze the effect of the fare integration system and the need of users, operators, and governmental managers. The establishment of appropriate type of organization is also discussed and evaluated. According to the result, the best alternative selling Center clearing center, multiple cards and selling units. According to the results of benefit/cost analysis, this alternative will provide IRR (internal rate of return) higher than the reasonable rate of return on investment used by the operators of buses and MRT systems. The present value of annual net benefit is positive which means this is a feasible solution.Keyword: smartcard, fare integration, benefit/cost analysisii
CHEN, JIA-PING, and 陳家平. "Explore Electronic Cash Cards (Smartcards) to Consume-Behavior of ConsumersThrough Technology Acceptance Model- as the Case of IPASS." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/kfk28c.
Full text國立屏東大學
資訊科學系碩士班
104
IPASScard is an electronic ticket which generally used in Southern Taiwan. Electronic tickets are equipped with a micropayment. With this function, it may apply on banks, convenience stores, restaurants, department stores, tourism using, local commercial district, and horizontal alliances in hospitals. Furthermore, the iPASS Corporation has issued over 9.6 million iPASS cards. It is now available on nearly 20,000 places such as public transportation (Taipei Metro, Kaohsiung Mass Rapid Transit, buses, public bikes), convenience stores, Px Marts, CPC Corporation, department stores, supermarkets, and chain tea shops in Taiwan. With the electronic tickets or co-branded credit cards involving the micropayment, the feature of consumption of automatic small-sums deposit and payment, users may make small-sums payments around Taiwan. The study was recognized as a new product, discussed with Technology Acceptance Model. The method to carry out this study was using a survey – “Explore electronic cash cards (smartcards) to consume-behavior of consumers through technology acceptance model-as the case of IPASS” designed by the researcher. Most of the participants in this study were universities students in Kaohsiung, and 482 questionnaires were returned. The researcher served SPSS as modeling tools of data collect and statistical analysis, containing a behavioral intention to use, a cognitive sensory, a perceived ease of use, and a perceived usefulness, of Technology Acceptance Model. The researcher collected the data to describe statistics, t test, analysis of variance , and other analysis. In order to realize the acceptance of iPASS card of consumers from universities students in Kaohsiung, and analyze the consumption level and the behavioral intention of iPASS of those students, the researcher analyzed those circumstances of using iPASS of the consumers with variable background, such as subjects’ genders, ages, academic years, residences, modes of transport, experiences of taking part-time jobs, and personal economic situation per month. The researcher further discussed about differences between each variable background, and the adding values, acceptance, behavioral intention of iPASS impacting on consumer behaviors. Furthermore, the study analyzed the key factor impacting users accepted iPASS. The conclusions of the study are as follows: 1.The behavioral intention of using iPASS cards for the micropayment of the students of universities in Kaohsiung reached a positive significant level. 2.There is a positive correlation between the perceived ease of use and the behavioral intention, of the students of universities in Kaohsiung. 3.There is a positive correlation between the perceived usefulness and the behavioral intention, of the students of universities in Kaohsiung. 4.There is a positive correlation between the cognitive sensory and the behavioral intention, of the students of universities in Kaohsiung. 5.The various life habits, residences, modes of transport and experiences of taking part-time jobs between the students of universities in Kaohsiung made the differences of ways of using iPASS cards for micropayment. However, the difference of personal usable money per month made a significance difference.