Results 321 to 330 of about 1,339,512 (383)
Some of the next articles are maybe not open access.
Mining metro commuting mobility patterns using massive smart card data
, 2021Juan Yong +5 more
semanticscholar +1 more source
Inferring trip purpose by clustering sequences of smart card records
, 2021H. Faroqi, M. Mesbah
semanticscholar +1 more source
Probabilistic model for destination inference and travel pattern mining from smart card data
Transportation, 2020Zhanhong Cheng, M. Trépanier, Lijun Sun
semanticscholar +1 more source
2008
In this chapter, a description of the various attacks and countermeasures that apply to secure smart card applications is described. This chapter focuses on the attacks that could affect cryptographic algorithms, since the security of many applications is dependent on the security of these algorithms.
openaire +1 more source
In this chapter, a description of the various attacks and countermeasures that apply to secure smart card applications is described. This chapter focuses on the attacks that could affect cryptographic algorithms, since the security of many applications is dependent on the security of these algorithms.
openaire +1 more source
ESEAP: ECC based secure and efficient mutual authentication protocol using smart card
Journal of Information Security and Applications, 2020Adesh Kumari +4 more
semanticscholar +1 more source

