Results 11 to 20 of about 2,263 (49)

Java Card for PayTv Application [PDF]

open access: yesarXiv, 2013
Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest computing platforms in use today.
arxiv  

Optimal Guessing Strategies in a Quantum Card Game [PDF]

open access: yesarXiv, 2002
Three different quantum cards which are non-orthogonal quantum bits are sent to two different players, Alice and Bob, randomly. Alice receives one of the three cards, and Bob receives the remaining two cards. We find that Bob could know better than Alice does on guessing Alice's card, no matter what Bob chooses to measure his two cards collectively or ...
arxiv  

AND Protocols Using Only Uniform Shuffles [PDF]

open access: yes, 2018
Secure multi-party computation using a deck of playing cards has been a subject of research since the "five-card trick" introduced by den Boer in 1989. One of the main problems in card-based cryptography is to design committed-format protocols to compute a Boolean AND operation subject to different runtime and shuffle restrictions by using as few cards
arxiv   +1 more source

No Feedback Card Guessing for Top to Random Shuffles [PDF]

open access: yesarXiv, 2010
Consider n cards that are labeled 1 through n with n an even integer. The cards are put face down and their ordering starts with card labeled 1 on top through card labeled n at the bottom. The cards are top to random shuffled m times and placed face down on the table. Starting from the top the cards are guessed without feedback (i.e.
arxiv  

Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks [PDF]

open access: yesSEC 2012, IFIP AICT 376, pp. 489-500, 2012, 2012
In this paper, we study the security requirements for remote authentication with password protected smart card. In recent years, several protocols for password-based authenticated key exchange have been proposed. These protocols are used for the protection of password based authentication between a client and a remote server.
arxiv  

Achieving data privacy for decision support systems in times of massive data sharing. [PDF]

open access: yesCluster Comput, 2022
Fazal R   +4 more
europepmc   +1 more source

Bio-Thentic Card: Authentication concept for RFID Card [PDF]

open access: yesarXiv, 2012
Radio frequency identification (RFID) is a technology that employs basic identifier of an object embedded in a chip, transmitted via radio wave, for identification. An RFID Card responds to query or interrogation irrespective of "Who" holds the Card; like a key to a door.
arxiv  

Card-cyclic-to-random shuffling with relabeling [PDF]

open access: yesarXiv, 2015
The card-cyclic-to-random shuffle is the card shuffle where the $n$ cards are labeled $1,\ldots,n$ according to their starting positions. Then the cards are mixed by first picking card $1$ from the deck and reinserting it at a uniformly random position, then repeating for card $2$, then for card $3$ and so on until all cards have been reinserted in ...
arxiv  

An analysis of a war-like card game [PDF]

open access: yesarXiv, 2010
In his book "Mathematical Mind-Benders", Peter Winkler poses the following open problem, originally due to the first author: "[In the game Peer Pressure,] two players are dealt some number of cards, initially face up, each card carrying a different integer.
arxiv  

Home - About - Disclaimer - Privacy