Results 321 to 330 of about 1,339,512 (383)
Some of the next articles are maybe not open access.

Mining metro commuting mobility patterns using massive smart card data

, 2021
Juan Yong   +5 more
semanticscholar   +1 more source

Smart Card Security

2008
In this chapter, a description of the various attacks and countermeasures that apply to secure smart card applications is described. This chapter focuses on the attacks that could affect cryptographic algorithms, since the security of many applications is dependent on the security of these algorithms.
openaire   +1 more source

ESEAP: ECC based secure and efficient mutual authentication protocol using smart card

Journal of Information Security and Applications, 2020
Adesh Kumari   +4 more
semanticscholar   +1 more source

Smart cards

Card Technology Today, 2004
Katherine M Shelfer   +3 more
openaire   +2 more sources

Smart Card

Academic Radiology, 2010
openaire   +2 more sources

Home - About - Disclaimer - Privacy