Results 1 to 10 of about 350,319 (172)
Reforms in electronic business have presented new opportunities to use smart card technology as an enabling tool. The network-centric applications, where resources are located throughout the Internet and access to them is possible from any location ...
Floarea NASTASE
doaj +3 more sources
Travel pattern-based bus trip origin-destination estimation using smart card data. [PDF]
Smart card data are widely used in generating the origin and destination (O-D) matrix for public transit, which contains important information for transportation planning and operation.
Inmook Lee +4 more
doaj +2 more sources
A Security Formal Verification Method for Protocols Using Cryptographic Contactless Smart Cards [PDF]
We present a method of contactless smart card protocol modeling suitable for finding vulnerabilities using model checking. Smart cards are used in applications that require high level of security, such as payment applications, therefore it should be ...
M. Henzl, P. Hanacek
doaj +4 more sources
Pemanfaatan AES dengan Key Dinamis sebagai Metode Pengamanan Data pada Smart Card
Abstrak Terjadinya pandemi Covid-19 di hampir seluruh belahan dunia, termasuk Indonesia, menjadikan masyarakat mempunyai gaya hidup baru dalam bertransaksi untuk mencegah penularan virus sesuai anjuran Pemerintah.
Noprianto Noprianto +2 more
doaj +1 more source
Efektifitas Media Smart Card (Kartu Pintar) dalam Meningkatkan Hasil Belajar Pembelajaran Tematik
Tujuan penelitian ini adalah untuk mengetahui efektivitas media smart card (kartu pintar) pada pembelajaran tematik di MIN 2 Kota Padang. Penelitiannya merupakan lapangan yang bersifat deskriptif kualitatif.
Rendy Nugraha Frasandy +2 more
doaj +1 more source
Multi-server Anonymous Authentication Scheme Based on Smart Card [PDF]
Through the analysis of robust smart card authentication scheme for multi-server architecture,it is found that this scheme does not fully realize user anonymous authentication,and exists Denial of Service(DoS) attack,smart card breach attack and other ...
WANG Mao,WANG Xiaoming
doaj +1 more source
This study aims to analyze the implementation of e-Government through Taspen Smart Card Program in pension fund services of State Civil Service. This study used a combination method of concurrent triangulation design (a balanced mix of quantitative and ...
Lukman Nul Hakim Amran Saputra +3 more
doaj +1 more source
Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design ...
Anuj Kumar Singh +3 more
doaj +1 more source
Perancangan Smart Card Reader Menggunakan STM32F4 Discovery Kit
Smart card has been a new trend as practical and secure authentication solution in online transactions such as epayment, net-banking, e-money, and other online services.
Agus Bejo +2 more
doaj +1 more source
Remote attestation mechanism for embedded devices based on physical unclonable functions [PDF]
Remote attestation mechanisms are well studied in the high-end computing environments; however, the same is not true for embedded devices-especially for smart cards.
Akram, Raja Naeem +2 more
core +2 more sources

