Results 11 to 20 of about 2,263 (49)
Java Card for PayTv Application [PDF]
Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest computing platforms in use today.
arxiv
Optimal Guessing Strategies in a Quantum Card Game [PDF]
Three different quantum cards which are non-orthogonal quantum bits are sent to two different players, Alice and Bob, randomly. Alice receives one of the three cards, and Bob receives the remaining two cards. We find that Bob could know better than Alice does on guessing Alice's card, no matter what Bob chooses to measure his two cards collectively or ...
arxiv
AND Protocols Using Only Uniform Shuffles [PDF]
Secure multi-party computation using a deck of playing cards has been a subject of research since the "five-card trick" introduced by den Boer in 1989. One of the main problems in card-based cryptography is to design committed-format protocols to compute a Boolean AND operation subject to different runtime and shuffle restrictions by using as few cards
arxiv +1 more source
No Feedback Card Guessing for Top to Random Shuffles [PDF]
Consider n cards that are labeled 1 through n with n an even integer. The cards are put face down and their ordering starts with card labeled 1 on top through card labeled n at the bottom. The cards are top to random shuffled m times and placed face down on the table. Starting from the top the cards are guessed without feedback (i.e.
arxiv
Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks [PDF]
In this paper, we study the security requirements for remote authentication with password protected smart card. In recent years, several protocols for password-based authenticated key exchange have been proposed. These protocols are used for the protection of password based authentication between a client and a remote server.
arxiv
Achieving data privacy for decision support systems in times of massive data sharing. [PDF]
Fazal R+4 more
europepmc +1 more source
Bio-Thentic Card: Authentication concept for RFID Card [PDF]
Radio frequency identification (RFID) is a technology that employs basic identifier of an object embedded in a chip, transmitted via radio wave, for identification. An RFID Card responds to query or interrogation irrespective of "Who" holds the Card; like a key to a door.
arxiv
Quantitative Metrics for Performance Monitoring of Software Code Analysis Accredited Testing Laboratories. [PDF]
Chapetta WA, das Neves JS, Machado RCS.
europepmc +1 more source
Card-cyclic-to-random shuffling with relabeling [PDF]
The card-cyclic-to-random shuffle is the card shuffle where the $n$ cards are labeled $1,\ldots,n$ according to their starting positions. Then the cards are mixed by first picking card $1$ from the deck and reinserting it at a uniformly random position, then repeating for card $2$, then for card $3$ and so on until all cards have been reinserted in ...
arxiv
An analysis of a war-like card game [PDF]
In his book "Mathematical Mind-Benders", Peter Winkler poses the following open problem, originally due to the first author: "[In the game Peer Pressure,] two players are dealt some number of cards, initially face up, each card carrying a different integer.
arxiv