Results 1 to 10 of about 350,319 (172)

Smart Card [PDF]

open access: yesInformatică economică, 2006
Reforms in electronic business have presented new opportunities to use smart card technology as an enabling tool. The network-centric applications, where resources are located throughout the Internet and access to them is possible from any location ...
Floarea NASTASE
doaj   +3 more sources

Travel pattern-based bus trip origin-destination estimation using smart card data. [PDF]

open access: yesPLoS ONE, 2022
Smart card data are widely used in generating the origin and destination (O-D) matrix for public transit, which contains important information for transportation planning and operation.
Inmook Lee   +4 more
doaj   +2 more sources

A Security Formal Verification Method for Protocols Using Cryptographic Contactless Smart Cards [PDF]

open access: yesRadioengineering, 2016
We present a method of contactless smart card protocol modeling suitable for finding vulnerabilities using model checking. Smart cards are used in applications that require high level of security, such as payment applications, therefore it should be ...
M. Henzl, P. Hanacek
doaj   +4 more sources

Pemanfaatan AES dengan Key Dinamis sebagai Metode Pengamanan Data pada Smart Card

open access: yesSistemasi: Jurnal Sistem Informasi, 2021
Abstrak Terjadinya pandemi Covid-19 di hampir seluruh belahan dunia, termasuk Indonesia, menjadikan masyarakat mempunyai gaya hidup baru dalam bertransaksi untuk mencegah penularan virus sesuai anjuran Pemerintah.
Noprianto Noprianto   +2 more
doaj   +1 more source

Efektifitas Media Smart Card (Kartu Pintar) dalam Meningkatkan Hasil Belajar Pembelajaran Tematik

open access: yesDawuh Guru, 2022
Tujuan penelitian ini adalah untuk mengetahui efektivitas media smart card (kartu pintar) pada pembelajaran tematik di MIN 2 Kota Padang. Penelitiannya merupakan lapangan yang bersifat deskriptif kualitatif.
Rendy Nugraha Frasandy   +2 more
doaj   +1 more source

Multi-server Anonymous Authentication Scheme Based on Smart Card [PDF]

open access: yesJisuanji gongcheng, 2016
Through the analysis of robust smart card authentication scheme for multi-server architecture,it is found that this scheme does not fully realize user anonymous authentication,and exists Denial of Service(DoS) attack,smart card breach attack and other ...
WANG Mao,WANG Xiaoming
doaj   +1 more source

E-Governance and Public Services in Local Governments: Study of The Taspen Smart Card Programfor Pension Fund Services in Makassar City and Pinrang Regency

open access: yesJurnal Studi Pemerintahan, 2023
This study aims to analyze the implementation of e-Government through Taspen Smart Card Program in pension fund services of State Civil Service. This study used a combination method of concurrent triangulation design (a balanced mix of quantitative and ...
Lukman Nul Hakim Amran Saputra   +3 more
doaj   +1 more source

Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards

open access: yesApplied Sciences, 2020
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design ...
Anuj Kumar Singh   +3 more
doaj   +1 more source

Perancangan Smart Card Reader Menggunakan STM32F4 Discovery Kit

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2017
Smart card has been a new trend as practical and secure authentication solution in online transactions such as epayment, net-banking, e-money, and other online services.
Agus Bejo   +2 more
doaj   +1 more source

Remote attestation mechanism for embedded devices based on physical unclonable functions [PDF]

open access: yes, 2013
Remote attestation mechanisms are well studied in the high-end computing environments; however, the same is not true for embedded devices-especially for smart cards.
Akram, Raja Naeem   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy